This is debian sparc64 sid/unstable LDOM running on T5-2 sparc machine. Trying to boot another LDOM, got this kernel OOPS (can't reproduce another time). Feb 16 11:53:16 deb4g kernel: ds-0: Machine description update. Feb 16 11:53:16 deb4g kernel: ------------[ cut here ]------------ Feb 16 11:53:16 deb4g kernel: WARNING: CPU: 13 PID: 179 at /build/linux-LRrlP2/linux-4.4/mm/page_alloc.c:2233 get_page_from_freelist+0x8a0/0x940() Feb 16 11:53:16 deb4g kernel: Modules linked in: libcrc32c dm_mod tun camellia_sparc64 des_sparc64 des_generic aes_sparc64 md5_sparc64 sha512_sparc6 4 sha256_sparc64 sha1_sparc64 autofs4 ext4 crc16 mbcache jbd2 btrfs xor zlib_deflate raid6_pq sunvnet sunvdc crc32c_sparc64 [last unloaded: xfs] Feb 16 11:53:16 deb4g kernel: CPU: 13 PID: 179 Comm: kldomd Not tainted 4.4.0-trunk-sparc64-smp #1 Debian 4.4-1~exp1 Feb 16 11:53:16 deb4g kernel: Call Trace: Feb 16 11:53:16 deb4g kernel: [0000000000466a50] warn_slowpath_common+0x70/0xc0 Feb 16 11:53:16 deb4g kernel: [0000000000466b3c] warn_slowpath_null+0x1c/0x40 Feb 16 11:53:16 deb4g kernel: [000000000055c2e0] get_page_from_freelist+0x8a0/0x940 Feb 16 11:53:16 deb4g kernel: [000000000055c5f4] __alloc_pages_nodemask+0x114/0x9e0 Feb 16 11:53:16 deb4g kernel: [00000000005a8c6c] cache_alloc_refill+0x34c/0x5a0 Feb 16 11:53:16 deb4g kernel: [00000000005a9188] __kmalloc+0x148/0x180 Feb 16 11:53:16 deb4g kernel: [000000000043be18] mdesc_kmalloc+0x18/0x60 Feb 16 11:53:16 deb4g kernel: [000000000043d270] mdesc_update+0x30/0x1a0 Feb 16 11:53:16 deb4g kernel: [00000000004526e0] md_update_data+0x20/0x60 Feb 16 11:53:16 deb4g kernel: [0000000000452284] ds_thread+0x1a4/0x1e0 Feb 16 11:53:16 deb4g kernel: [00000000004858ac] kthread+0xac/0xe0 Feb 16 11:53:16 deb4g kernel: [00000000004060e4] ret_from_fork+0x1c/0x2c Feb 16 11:53:16 deb4g kernel: [0000000000000000] (null) Feb 16 11:53:16 deb4g kernel: ---[ end trace 3ceb1e838719c43c ]--- Feb 16 11:53:16 deb4g kernel: VIO: Adding device vnet-port-0-3 Feb 16 11:53:16 deb4g kernel: Kernel unaligned access at TPC[b6de1c] mdesc_memblock_free+0x0/0x74 Feb 16 11:53:16 deb4g kernel: sunvnet: eth0: PORT ( remote-mac 00:14:4f:fa:57:1c ) Feb 16 11:53:16 deb4g kernel: Unable to handle kernel NULL pointer dereference in mna handler Feb 16 11:53:16 deb4g kernel: at virtual address 000000000000002d Feb 16 11:53:16 deb4g kernel: current->{active_,}mm->context = 0000000000001c28 Feb 16 11:53:16 deb4g kernel: current->{active_,}mm->pgd = fff800098d2de000 Feb 16 11:53:16 deb4g kernel: \|/ ____ \|/ "@'/ .. \`@" /_| \__/ |_\ \__U_/ Feb 16 11:53:16 deb4g kernel: kldomd(179): Oops [#1] Feb 16 11:53:16 deb4g kernel: CPU: 13 PID: 179 Comm: kldomd Tainted: G W 4.4.0-trunk-sparc64-smp #1 Debian 4.4-1~exp1 Feb 16 11:53:16 deb4g kernel: task: fff800100063afe0 ti: fff8000fff288000 task.ti: fff8000fff288000 Feb 16 11:53:16 deb4g kernel: TSTATE: 0000004480e01605 TPC: 0000000000b6de1c TNPC: 0000000000b6de20 Y: 00000000 Tainted: G W Feb 16 11:53:16 deb4g kernel: TPC: <mdesc_memblock_free+0x0/0x74> Feb 16 11:53:16 deb4g kernel: g0: 0000000000a0b558 g1: 0000000000b6de1c g2: 0000000000000000 g3: 0000000000000000 Feb 16 11:53:16 deb4g kernel: g4: fff800100063afe0 g5: fff800102d900000 g6: fff8000fff288000 g7: 0000000000000001 Feb 16 11:53:16 deb4g kernel: o0: fff800102fc74000 o1: 0000000000ac9800 o2: 0000000000000001 o3: 0000000000450a00 Feb 16 11:53:16 deb4g kernel: o4: 0000000000a5f5d8 o5: 00000000000006d6 sp: fff8000fff28b301 ret_pc: 000000000043d348 Feb 16 11:53:16 deb4g kernel: RPC: <mdesc_update+0x108/0x1a0> Feb 16 11:53:16 deb4g kernel: l0: fff8001001184840 l1: fff800102e4d2100 l2: fff8000ffaa96fc0 l3: 0000000000000400 Feb 16 11:53:16 deb4g kernel: l4: 0000000000000000 l5: 0000000000000000 l6: 0000000000000000 l7: 0000000000000008 Feb 16 11:53:16 deb4g kernel: i0: 0000000000000021 i1: 0000000000ac9800 i2: 0000000000bed800 i3: fff800102fc74000 Feb 16 11:53:16 deb4g kernel: i4: fff8000c11770000 i5: 0000000000000000 i6: fff8000fff28b3c1 i7: 00000000004526e0 Feb 16 11:53:16 deb4g kernel: I7: <md_update_data+0x20/0x60> Feb 16 11:53:16 deb4g kernel: Call Trace: Feb 16 11:53:16 deb4g kernel: [00000000004526e0] md_update_data+0x20/0x60 Feb 16 11:53:16 deb4g kernel: [0000000000452284] ds_thread+0x1a4/0x1e0 Feb 16 11:53:16 deb4g kernel: [00000000004858ac] kthread+0xac/0xe0 Feb 16 11:53:16 deb4g kernel: [00000000004060e4] ret_from_fork+0x1c/0x2c Feb 16 11:53:16 deb4g kernel: [0000000000000000] (null) Feb 16 11:53:16 deb4g kernel: Disabling lock debugging due to kernel taint Feb 16 11:53:16 deb4g kernel: Caller[00000000004526e0]: md_update_data+0x20/0x60 Feb 16 11:53:16 deb4g kernel: Caller[0000000000452284]: ds_thread+0x1a4/0x1e0 Feb 16 11:53:16 deb4g kernel: Caller[00000000004858ac]: kthread+0xac/0xe0 Feb 16 11:53:16 deb4g kernel: Caller[00000000004060e4]: ret_from_fork+0x1c/0x2c Feb 16 11:53:16 deb4g kernel: Caller[0000000000000000]: (null) Feb 16 11:53:16 deb4g kernel: Instruction DUMP: c44e4000 106ffcb4 c217a7bf <f206200c> 82102001 f4062010 90100018 ba1f6001 c226200c
once again, binding another domain (not even starting it), causes linux kernel to OOPS: Feb 29 13:24:30 deb4g kernel: ds-0: Machine description update. Feb 29 13:24:30 deb4g kernel: ------------[ cut here ]------------ Feb 29 13:24:30 deb4g kernel: WARNING: CPU: 13 PID: 179 at /build/linux-cs59zJ/linux-4.4.1/mm/page_alloc.c:2233 get_page_from_freelist+0x8a0/0x940() Feb 29 13:24:30 deb4g kernel: Modules linked in: n2_rng tun dm_mod camellia_sparc64 des_sparc64 des_generic aes_sparc64 md5_sparc64 sha512_sparc64 sha256_sparc64 sha1_sparc64 rng_core autofs4 ext4 crc16 mbcache jbd2 btrfs xor zlib_deflate raid6_pq sunvnet sunvdc crc32c_sparc64 [last unloaded: n2_rng] Feb 29 13:24:30 deb4g kernel: CPU: 13 PID: 179 Comm: kldomd Not tainted 4.4.0-trunk-sparc64-smp #1 Debian 4.4.1-1~exp1 Feb 29 13:24:30 deb4g kernel: Call Trace: Feb 29 13:24:30 deb4g kernel: [0000000000466a70] warn_slowpath_common+0x70/0xc0 Feb 29 13:24:30 deb4g kernel: [0000000000466b5c] warn_slowpath_null+0x1c/0x40 Feb 29 13:24:30 deb4g kernel: [000000000055c880] get_page_from_freelist+0x8a0/0x940 Feb 29 13:24:30 deb4g kernel: [000000000055cb94] __alloc_pages_nodemask+0x114/0x9e0 Feb 29 13:24:30 deb4g kernel: [00000000005a920c] cache_alloc_refill+0x34c/0x5a0 Feb 29 13:24:30 deb4g kernel: [00000000005a9728] __kmalloc+0x148/0x180 Feb 29 13:24:30 deb4g kernel: [000000000043be18] mdesc_kmalloc+0x18/0x60 Feb 29 13:24:30 deb4g kernel: [000000000043d270] mdesc_update+0x30/0x1a0 Feb 29 13:24:30 deb4g kernel: [00000000004526e0] md_update_data+0x20/0x60 Feb 29 13:24:30 deb4g kernel: [0000000000452284] ds_thread+0x1a4/0x1e0 Feb 29 13:24:30 deb4g kernel: [00000000004858cc] kthread+0xac/0xe0 Feb 29 13:24:30 deb4g kernel: [00000000004060e4] ret_from_fork+0x1c/0x2c Feb 29 13:24:30 deb4g kernel: [0000000000000000] (null) Feb 29 13:24:30 deb4g kernel: ---[ end trace 72e6e2f617d5e977 ]--- Feb 29 13:24:30 deb4g kernel: VIO: Adding device vnet-port-0-3 Feb 29 13:24:30 deb4g kernel: sunvnet: eth0: PORT ( remote-mac 00:14:4f:f8:38:39 ) Feb 29 13:24:30 deb4g kernel: \|/ ____ \|/ "@'/ .. \`@" /_| \__/ |_\ \__U_/ Feb 29 13:24:30 deb4g kernel: kldomd(179): Kernel illegal instruction [#1] Feb 29 13:24:30 deb4g kernel: CPU: 13 PID: 179 Comm: kldomd Tainted: G W 4.4.0-trunk-sparc64-smp #1 Debian 4.4.1-1~exp1 Feb 29 13:24:30 deb4g kernel: task: fff8001000638fe0 ti: fff8000fff2a4000 task.ti: fff8000fff2a4000 Feb 29 13:24:30 deb4g kernel: TSTATE: 0000004480e01605 TPC: 0000000000b71e1c TNPC: 0000000000b71e20 Y: 00000000 Tainted: G W Feb 29 13:24:30 deb4g kernel: TPC: <mdesc_memblock_free+0x0/0x74> Feb 29 13:24:30 deb4g kernel: g0: 0000000000a0d8b0 g1: 0000000000b71e1c g2: 0000000000000000 g3: 0000000000000000 Feb 29 13:24:30 deb4g kernel: g4: fff8001000638fe0 g5: fff800102d8fc000 g6: fff8000fff2a4000 g7: 0000000000000001 Feb 29 13:24:30 deb4g kernel: o0: fff800102fc74000 o1: 0000000000acd800 o2: 0000000000000001 o3: 0000000000450a00 Feb 29 13:24:30 deb4g kernel: o4: 0000000000a61de0 o5: 00000000000006d6 sp: fff8000fff2a7301 ret_pc: 000000000043d348 Feb 29 13:24:30 deb4g kernel: RPC: <mdesc_update+0x108/0x1a0> Feb 29 13:24:30 deb4g kernel: l0: fff8001001184840 l1: fff800102e4d2100 l2: fff8000ffa89b760 l3: 0000000000000400 Feb 29 13:24:30 deb4g kernel: l4: 0000000000000000 l5: 0000000000000000 l6: 0000000000000000 l7: 0000000000000008 Feb 29 13:24:30 deb4g kernel: i0: 0000000000000021 i1: 0000000000acd800 i2: 0000000000bf1800 i3: fff800102fc74000 Feb 29 13:24:30 deb4g kernel: i4: fff8000ffd1c0000 i5: 0000000000000000 i6: fff8000fff2a73c1 i7: 00000000004526e0 Feb 29 13:24:30 deb4g kernel: I7: <md_update_data+0x20/0x60> Feb 29 13:24:30 deb4g kernel: Call Trace: Feb 29 13:24:30 deb4g kernel: [00000000004526e0] md_update_data+0x20/0x60 Feb 29 13:24:30 deb4g kernel: [0000000000452284] ds_thread+0x1a4/0x1e0 Feb 29 13:24:30 deb4g kernel: [00000000004858cc] kthread+0xac/0xe0 Feb 29 13:24:30 deb4g kernel: [00000000004060e4] ret_from_fork+0x1c/0x2c Feb 29 13:24:30 deb4g kernel: [0000000000000000] (null) Feb 29 13:24:30 deb4g kernel: Disabling lock debugging due to kernel taint Feb 29 13:24:30 deb4g kernel: Caller[00000000004526e0]: md_update_data+0x20/0x60 Feb 29 13:24:30 deb4g kernel: Caller[0000000000452284]: ds_thread+0x1a4/0x1e0 Feb 29 13:24:30 deb4g kernel: Caller[00000000004858cc]: kthread+0xac/0xe0 Feb 29 13:24:30 deb4g kernel: Caller[00000000004060e4]: ret_from_fork+0x1c/0x2c Feb 29 13:24:30 deb4g kernel: Caller[0000000000000000]: (null) Feb 29 13:24:30 deb4g kernel: Instruction DUMP: 00000000 00000000 00000000 <00000000> 00000000 00000000 00000000 00000000 00000000
just for information: control domain is stock (non patched) solaris 11.3 with ldm manager: sysadmin@deimos:~$ pkg search '/usr/sbin/ldm' INDEX ACTION VALUE PACKAGE path file usr/sbin/ldm pkg:/system/ldoms/ldomsmanager@3.3.0.0.17-0.175.3.0.0.28.0 sysadmin@deimos:~$ ldm -V Logical Domains Manager (v 3.3.0.0.17) Hypervisor control protocol v 1.12 Using Hypervisor MD v 1.4 System PROM: Hostconfig v. 1.6.1.a @(#)Hostconfig 1.6.1.a 2015/09/09 13:15 Hypervisor v. 1.15.1.a @(#)Hypervisor 1.15.1.a 2015/09/09 12:51 OpenBoot v. 4.38.1 @(#)OpenBoot 4.38.1 2015/08/21 14:26
got updated T5-2 firmware package, now hardware is in the following configuration: sysadmin@deimos:~$ ldm -V Logical Domains Manager (v 3.3.0.0.17) Hypervisor control protocol v 1.12 Using Hypervisor MD v 1.4 System PROM: Hostconfig v. 1.6.3 @(#)Hostconfig 1.6.3 2015/11/25 08:57 Hypervisor v. 1.15.3 @(#)Hypervisor 1.15.3 2015/11/11 17:15 OpenBoot v. 4.38.3 @(#)OpenBoot 4.38.3 2015/11/11 10:38 firmware update requires hard server reboot (poweroff / poweron sequence), so booting server (parallel startup of multiple LDOMs), got the following kernel warning in one of the LDOMs (debian linux sparc64): Feb 29 23:04:08 deb4g kernel: Supported PMU type is 'niagara5' Feb 29 23:04:08 deb4g kernel: ldc.c:v1.1 (July 22, 2008) Feb 29 23:04:08 deb4g kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns Feb 29 23:04:08 deb4g kernel: NET: Registered protocol family 16 Feb 29 23:04:08 deb4g kernel: VIO: Adding device channel-devices Feb 29 23:04:08 deb4g kernel: VIO: Adding device vnet-port-0-0 Feb 29 23:04:08 deb4g kernel: VIO: Adding device vnet-port-0-1 Feb 29 23:04:08 deb4g kernel: VIO: Adding device vnet-port-0-2 Feb 29 23:04:08 deb4g kernel: VIO: Adding device vnet-port-0-3 Feb 29 23:04:08 deb4g kernel: VIO: Adding device vdc-port-2-0 Feb 29 23:04:08 deb4g kernel: VIO: Adding device vdc-port-1-0 Feb 29 23:04:08 deb4g kernel: VIO: Adding device vdc-port-3-0 Feb 29 23:04:08 deb4g kernel: VIO: Adding device vdc-port-4-0 Feb 29 23:04:08 deb4g kernel: VIO: Adding device vdc-port-0-0 Feb 29 23:04:08 deb4g kernel: VIO: Adding device vlds-port-0-0 Feb 29 23:04:08 deb4g kernel: VIO: Adding device ds-0 Feb 29 23:04:08 deb4g kernel: vgaarb: loaded Feb 29 23:04:08 deb4g kernel: SUN4V: Reboot data supported (maj=1,min=0). Feb 29 23:04:08 deb4g kernel: ds.c:v1.0 (Jul 11, 2007) Feb 29 23:04:08 deb4g kernel: ds-0: ds_conn_reset() from send_events Feb 29 23:04:08 deb4g kernel: clocksource: Switched to clocksource stick Feb 29 23:04:08 deb4g kernel: ds-0: Registered md-update service. Feb 29 23:04:08 deb4g kernel: ds-0: Registered domain-shutdown service. Feb 29 23:04:08 deb4g kernel: ds-0: Registered domain-panic service. Feb 29 23:04:08 deb4g kernel: ds-0: Registered dr-cpu service. Feb 29 23:04:08 deb4g kernel: ds-0: Registered pri service. Feb 29 23:04:08 deb4g kernel: ds-0: Registered var-config service. Feb 29 23:04:08 deb4g kernel: ds-0: Machine description update. Feb 29 23:04:08 deb4g kernel: ------------[ cut here ]------------ Feb 29 23:04:08 deb4g kernel: WARNING: CPU: 29 PID: 179 at /build/linux-cs59zJ/linux-4.4.1/mm/page_alloc.c:2233 get_page_from_freelist+0x8a0/0x940() Feb 29 23:04:08 deb4g kernel: Modules linked in: Feb 29 23:04:08 deb4g kernel: CPU: 29 PID: 179 Comm: kldomd Not tainted 4.4.0-trunk-sparc64-smp #1 Debian 4.4.1-1~exp1 Feb 29 23:04:08 deb4g kernel: Call Trace: Feb 29 23:04:08 deb4g kernel: [0000000000466a70] warn_slowpath_common+0x70/0xc0 Feb 29 23:04:08 deb4g kernel: [0000000000466b5c] warn_slowpath_null+0x1c/0x40 Feb 29 23:04:08 deb4g kernel: [000000000055c880] get_page_from_freelist+0x8a0/0x940 Feb 29 23:04:08 deb4g kernel: [000000000055cb94] __alloc_pages_nodemask+0x114/0x9e0 Feb 29 23:04:08 deb4g kernel: [00000000005a920c] cache_alloc_refill+0x34c/0x5a0 Feb 29 23:04:08 deb4g kernel: [00000000005a9728] __kmalloc+0x148/0x180 Feb 29 23:04:08 deb4g kernel: [000000000043be18] mdesc_kmalloc+0x18/0x60 Feb 29 23:04:08 deb4g kernel: [000000000043d270] mdesc_update+0x30/0x1a0 Feb 29 23:04:08 deb4g kernel: [00000000004526e0] md_update_data+0x20/0x60 Feb 29 23:04:08 deb4g kernel: [0000000000452284] ds_thread+0x1a4/0x1e0 Feb 29 23:04:08 deb4g kernel: [00000000004858cc] kthread+0xac/0xe0 Feb 29 23:04:08 deb4g kernel: [00000000004060e4] ret_from_fork+0x1c/0x2c Feb 29 23:04:08 deb4g kernel: [0000000000000000] (null) Feb 29 23:04:08 deb4g kernel: ---[ end trace 4e5f6ed02de69a82 ]--- Feb 29 23:04:08 deb4g kernel: NET: Registered protocol family 2 Feb 29 23:04:08 deb4g kernel: TCP established hash table entries: 524288 (order: 9, 4194304 bytes) Feb 29 23:04:08 deb4g kernel: TCP bind hash table entries: 65536 (order: 7, 1048576 bytes) Feb 29 23:04:08 deb4g kernel: TCP: Hash tables configured (established 524288 bind 65536) Feb 29 23:04:08 deb4g kernel: UDP hash table entries: 32768 (order: 7, 1048576 bytes) Feb 29 23:04:08 deb4g kernel: UDP-Lite hash table entries: 32768 (order: 7, 1048576 bytes) Feb 29 23:04:08 deb4g kernel: NET: Registered protocol family 1 Feb 29 23:04:08 deb4g kernel: PCI: CLS 0 bytes, default 64 Feb 29 23:04:08 deb4g kernel: Unpacking initramfs... Feb 29 23:04:08 deb4g kernel: Freeing initrd memory: 17376K (fff8000074000000 - fff80000750f8000) Next two test reboots of this LDOM, does not show any kernel OOPS. So it seems kernel complains only when receive/happens machine description (MD) update event. PS: attached full "journalctl -b" output from boot.
Created attachment 206481 [details] boot log kernel warning , 29 feb
still valid for kernel 4.5 : Apr 01 18:26:37 landau.east.ru kernel: ds-0: Machine description update. Apr 01 18:26:37 landau.east.ru kernel: ------------[ cut here ]------------ Apr 01 18:26:37 landau.east.ru kernel: WARNING: CPU: 41 PID: 658 at /build/linux-XaLpSN/linux-4.5/mm/page_alloc.c:2252 get_page_from_freelist+0x894/ Apr 01 18:26:37 landau.east.ru kernel: Modules linked in: tun xt_tcpudp xt_multiport xt_conntrack iptable_filter iptable_nat nf_conntrack_ipv4 nf_de Apr 01 18:26:37 landau.east.ru kernel: CPU: 41 PID: 658 Comm: kldomd Not tainted 4.5.0-trunk-sparc64-smp #1 Debian 4.5-1~exp1 Apr 01 18:26:37 landau.east.ru kernel: Call Trace: Apr 01 18:26:37 landau.east.ru kernel: [0000000000466990] warn_slowpath_common+0x70/0xc0 Apr 01 18:26:37 landau.east.ru kernel: [0000000000466a7c] warn_slowpath_null+0x1c/0x40 Apr 01 18:26:37 landau.east.ru kernel: [00000000005626b4] get_page_from_freelist+0x894/0x940 Apr 01 18:26:37 landau.east.ru kernel: [00000000005629d0] __alloc_pages_nodemask+0x110/0xae0 Apr 01 18:26:37 landau.east.ru kernel: [00000000005b55d8] cache_alloc_refill+0x358/0x620 Apr 01 18:26:37 landau.east.ru kernel: [00000000005b60f4] __kmalloc+0x1f4/0x220 Apr 01 18:26:37 landau.east.ru kernel: [000000000043bbf8] mdesc_kmalloc+0x18/0x60 Apr 01 18:26:37 landau.east.ru kernel: [000000000043d070] mdesc_update+0x30/0x1a0 Apr 01 18:26:37 landau.east.ru kernel: [0000000000452a20] md_update_data+0x20/0x60 Apr 01 18:26:37 landau.east.ru kernel: [0000000000451fc8] ds_thread+0x1a8/0x1e0 Apr 01 18:26:37 landau.east.ru kernel: [0000000000485f8c] kthread+0xac/0xe0 Apr 01 18:26:37 landau.east.ru kernel: [00000000004060e4] ret_from_fork+0x1c/0x2c Apr 01 18:26:37 landau.east.ru kernel: [0000000000000000] (null) Apr 01 18:26:37 landau.east.ru kernel: ---[ end trace ba8e0300a1562a90 ]--- Apr 01 18:26:37 landau.east.ru kernel: VIO: Adding device vnet-port-0-4 Apr 01 18:26:37 landau.east.ru kernel: sunvnet: eth0: PORT ( remote-mac 00:14:4f:f8:68:82 ) Apr 01 18:26:37 landau.east.ru kernel: OOPS: Bogus kernel PC [fffffffff162cce4] in fault handler Apr 01 18:26:37 landau.east.ru kernel: OOPS: RPC [0000000000b9be34] Apr 01 18:26:37 landau.east.ru kernel: OOPS: RPC <mdesc_memblock_free+0x4/0x74> Apr 01 18:26:37 landau.east.ru kernel: OOPS: Fault was to vaddr[fffffffff162cce4] Apr 01 18:26:37 landau.east.ru kernel: CPU: 41 PID: 658 Comm: kldomd Tainted: G W 4.5.0-trunk-sparc64-smp #1 Debian 4.5-1~exp1 Apr 01 18:26:37 landau.east.ru kernel: Call Trace: Apr 01 18:26:37 landau.east.ru kernel: [0000000000962338] do_sparc64_fault+0x178/0x9c0 Apr 01 18:26:37 landau.east.ru kernel: [0000000000407c90] sparc64_realfault_common+0x10/0x20 Apr 01 18:26:37 landau.east.ru kernel: [fffffffff162cce4] 0xfffffffff162cce4 Apr 01 18:26:37 landau.east.ru kernel: [0000000000452a20] md_update_data+0x20/0x60 Apr 01 18:26:37 landau.east.ru kernel: [0000000000451fc8] ds_thread+0x1a8/0x1e0 Apr 01 18:26:37 landau.east.ru kernel: [0000000000485f8c] kthread+0xac/0xe0 Apr 01 18:26:37 landau.east.ru kernel: [00000000004060e4] ret_from_fork+0x1c/0x2c Apr 01 18:26:37 landau.east.ru kernel: [0000000000000000] (null) Apr 01 18:26:37 landau.east.ru kernel: Unable to handle kernel paging request at virtual address fffffffff162cce4 Apr 01 18:26:37 landau.east.ru kernel: tsk->{mm,active_mm}->context = 000000000000058d Apr 01 18:26:37 landau.east.ru kernel: tsk->{mm,active_mm}->pgd = fff800201fd1e000 Apr 01 18:26:37 landau.east.ru kernel: \|/ ____ \|/ "@'/ .. \`@" /_| \__/ |_\ \__U_/ Apr 01 18:26:37 landau.east.ru kernel: kldomd(658): Oops [#1] Apr 01 18:26:37 landau.east.ru kernel: CPU: 41 PID: 658 Comm: kldomd Tainted: G W 4.5.0-trunk-sparc64-smp #1 Debian 4.5-1~exp1 Apr 01 18:26:37 landau.east.ru kernel: task: fff8002023fecc60 ti: fff8002023024000 task.ti: fff8002023024000 Apr 01 18:26:37 landau.east.ru kernel: TSTATE: 0000004480e01605 TPC: fffffffff162cce4 TNPC: 0000000028a9623c Y: 00000000 Tainted: G W Apr 01 18:26:37 landau.east.ru kernel: TPC: <0xfffffffff162cce4> Apr 01 18:26:37 landau.east.ru kernel: g0: 0000000000a33268 g1: 0000000000b9be30 g2: 0000000000000000 g3: 0000000000000000 Apr 01 18:26:37 landau.east.ru kernel: g4: fff8002023fecc60 g5: fff800207da92000 g6: fff8002023024000 g7: 0000000000000001 Apr 01 18:26:37 landau.east.ru kernel: o0: fff800207fec4000 o1: 0000000000af6000 o2: 0000000000000001 o3: 00000000004506c0 Apr 01 18:26:37 landau.east.ru kernel: o4: 0000000000a881d0 o5: 00000000000016b9 sp: fff8002023027301 ret_pc: 0000000000b9be34 Apr 01 18:26:37 landau.east.ru kernel: RPC: <mdesc_memblock_free+0x4/0x74> Apr 01 18:26:37 landau.east.ru kernel: l0: fff800202628aa40 l1: fff800207e692100 l2: fff800200e0ae020 l3: 0000000000004000 Apr 01 18:26:37 landau.east.ru kernel: l4: 0000000000000000 l5: 0000000000000000 l6: 0000000000000000 l7: 0000000000000008 Apr 01 18:26:37 landau.east.ru kernel: i0: 0000000000000021 i1: 0000000000af6000 i2: 0000000000c1b800 i3: fff800207fec4000 Apr 01 18:26:37 landau.east.ru kernel: i4: fff8001f9ac20000 i5: 0000000000000000 i6: fff80020230273c1 i7: 0000000000452a20 Apr 01 18:26:37 landau.east.ru kernel: I7: <md_update_data+0x20/0x60> Apr 01 18:26:37 landau.east.ru kernel: Call Trace: Apr 01 18:26:37 landau.east.ru kernel: [0000000000452a20] md_update_data+0x20/0x60 Apr 01 18:26:37 landau.east.ru kernel: [0000000000451fc8] ds_thread+0x1a8/0x1e0 Apr 01 18:26:37 landau.east.ru kernel: [0000000000485f8c] kthread+0xac/0xe0 Apr 01 18:26:37 landau.east.ru kernel: [00000000004060e4] ret_from_fork+0x1c/0x2c Apr 01 18:26:37 landau.east.ru kernel: [0000000000000000] (null) Apr 01 18:26:37 landau.east.ru kernel: Disabling lock debugging due to kernel taint Apr 01 18:26:37 landau.east.ru kernel: Caller[0000000000452a20]: md_update_data+0x20/0x60 Apr 01 18:26:37 landau.east.ru kernel: Caller[0000000000451fc8]: ds_thread+0x1a8/0x1e0 Apr 01 18:26:37 landau.east.ru kernel: Caller[0000000000485f8c]: kthread+0xac/0xe0 Apr 01 18:26:37 landau.east.ru kernel: Caller[00000000004060e4]: ret_from_fork+0x1c/0x2c Apr 01 18:26:37 landau.east.ru kernel: Caller[0000000000000000]: (null) Apr 01 18:26:37 landau.east.ru kernel: Instruction DUMP: Apr 01 18:26:37 landau.east.ru kernel: Unable to handle kernel paging request at virtual address fffffffff162c000 Apr 01 18:26:37 landau.east.ru kernel: tsk->{mm,active_mm}->context = 000000000000058d Apr 01 18:26:37 landau.east.ru kernel: tsk->{mm,active_mm}->pgd = fff800201fd1e000 Apr 01 18:26:37 landau.east.ru kernel: \|/ ____ \|/ "@'/ .. \`@" /_| \__/ |_\ \__U_/ Apr 01 18:26:37 landau.east.ru kernel: kldomd(658): Oops [#2] Apr 01 18:26:37 landau.east.ru kernel: CPU: 41 PID: 658 Comm: kldomd Tainted: G D W 4.5.0-trunk-sparc64-smp #1 Debian 4.5-1~exp1 Apr 01 18:26:37 landau.east.ru kernel: task: fff8002023fecc60 ti: fff8002023024000 task.ti: fff8002023024000 Apr 01 18:26:37 landau.east.ru kernel: TSTATE: 0000008880e01601 TPC: 000000000042896c TNPC: 0000000000428970 Y: 00001957 Tainted: G D W Apr 01 18:26:37 landau.east.ru kernel: TPC: <die_if_kernel+0x28c/0x320> Apr 01 18:26:37 landau.east.ru kernel: g0: 000000000000000e g1: 0000000000a2ec00 g2: 0000000000b08250 g3: 0000000000000001 Apr 01 18:26:37 landau.east.ru kernel: g4: fff8002023fecc60 g5: fff800207da92000 g6: fff8002023024000 g7: 0000000000000029 Apr 01 18:26:37 landau.east.ru kernel: o0: 0000000000000011 o1: 0000000000000000 o2: 0000000000000000 o3: 0000000000000020 Apr 01 18:26:37 landau.east.ru kernel: o4: fffffffff162cce4 o5: 0000004480e01605 sp: fff8002023026f41 ret_pc: 0000000000428950 Apr 01 18:26:37 landau.east.ru kernel: RPC: <die_if_kernel+0x270/0x320> Apr 01 18:26:37 landau.east.ru kernel: l0: fff8002023024b80 l1: 0000000000c16800 l2: 0000000000c16000 l3: fff8002023027f40 Apr 01 18:26:37 landau.east.ru kernel: l4: 0000000000000000 l5: 0000000000000008 l6: 0000000000ae6800 l7: 0000000000ae7800 Apr 01 18:26:37 landau.east.ru kernel: i0: fff8002023024000 i1: fff8002023027a60 i2: fffffffff162ccd8 i3: fffffffffffffffe Apr 01 18:26:37 landau.east.ru kernel: i4: 0000000000a2ef38 i5: fffffffff162cce4 i6: fff8002023027021 i7: 00000000009621a0 Apr 01 18:26:37 landau.east.ru kernel: I7: <unhandled_fault+0x8c/0xac> Apr 01 18:26:37 landau.east.ru kernel: Call Trace: Apr 01 18:26:37 landau.east.ru kernel: [00000000009621a0] unhandled_fault+0x8c/0xac Apr 01 18:26:37 landau.east.ru kernel: [0000000000962348] do_sparc64_fault+0x188/0x9c0 Apr 01 18:26:37 landau.east.ru kernel: [0000000000407c90] sparc64_realfault_common+0x10/0x20 Apr 01 18:26:37 landau.east.ru kernel: [fffffffff162cce4] 0xfffffffff162cce4 Apr 01 18:26:37 landau.east.ru kernel: [0000000000452a20] md_update_data+0x20/0x60 Apr 01 18:26:37 landau.east.ru kernel: [0000000000451fc8] ds_thread+0x1a8/0x1e0 Apr 01 18:26:37 landau.east.ru kernel: [0000000000485f8c] kthread+0xac/0xe0 Apr 01 18:26:37 landau.east.ru kernel: [00000000004060e4] ret_from_fork+0x1c/0x2c Apr 01 18:26:37 landau.east.ru kernel: [0000000000000000] (null) Apr 01 18:26:37 landau.east.ru kernel: Caller[00000000009621a0]: unhandled_fault+0x8c/0xac Apr 01 18:26:37 landau.east.ru kernel: Caller[0000000000962348]: do_sparc64_fault+0x188/0x9c0 Apr 01 18:26:37 landau.east.ru kernel: Caller[0000000000407c90]: sparc64_realfault_common+0x10/0x20 Apr 01 18:26:37 landau.east.ru kernel: Caller[0000000000b9be34]: mdesc_memblock_free+0x4/0x74 Apr 01 18:26:37 landau.east.ru kernel: Caller[0000000000452a20]: md_update_data+0x20/0x60 Apr 01 18:26:37 landau.east.ru kernel: Caller[0000000000451fc8]: ds_thread+0x1a8/0x1e0 Apr 01 18:26:37 landau.east.ru kernel: Caller[0000000000485f8c]: kthread+0xac/0xe0 Apr 01 18:26:37 landau.east.ru kernel: Caller[00000000004060e4]: ret_from_fork+0x1c/0x2c Apr 01 18:26:37 landau.east.ru kernel: Caller[0000000000000000]: (null) Apr 01 18:26:37 landau.east.ru kernel: Instruction DUMP: 80a6e001 02400016 96102020 <d4068000> 92102020 4004bc87 9010001c 80a6e006 0247ffec
May 04 10:57:06 deb4g kernel: ds-0: Machine description update. May 04 10:57:06 deb4g kernel: ------------[ cut here ]------------ May 04 10:57:06 deb4g kernel: WARNING: CPU: 30 PID: 178 at /build/linux-niWLGx/linux-4.5.2/mm/page_alloc.c:2272 get_page_from_freelist+0x894/0x940() May 04 10:57:06 deb4g kernel: Modules linked in: tun(E) camellia_sparc64(E) des_sparc64(E) des_generic(E) md5_sparc64(E) sha512_sparc64(E) sha256_sp May 04 10:57:06 deb4g kernel: CPU: 30 PID: 178 Comm: kldomd Tainted: G E 4.5.0-2-sparc64-smp #1 Debian 4.5.2-1 May 04 10:57:06 deb4g kernel: Call Trace: May 04 10:57:06 deb4g kernel: [00000000004669d0] warn_slowpath_common+0x70/0xc0 May 04 10:57:06 deb4g kernel: [0000000000466abc] warn_slowpath_null+0x1c/0x40 May 04 10:57:06 deb4g kernel: [0000000000562574] get_page_from_freelist+0x894/0x940 May 04 10:57:06 deb4g kernel: [0000000000562890] __alloc_pages_nodemask+0x110/0xae0 May 04 10:57:06 deb4g kernel: [00000000005b5278] cache_alloc_refill+0x358/0x620 May 04 10:57:06 deb4g kernel: [00000000005b5d94] __kmalloc+0x1f4/0x220 May 04 10:57:06 deb4g kernel: [000000000043bbd8] mdesc_kmalloc+0x18/0x60 May 04 10:57:06 deb4g kernel: [000000000043d050] mdesc_update+0x30/0x1a0 May 04 10:57:06 deb4g kernel: [0000000000452a60] md_update_data+0x20/0x60 May 04 10:57:06 deb4g kernel: [0000000000452008] ds_thread+0x1a8/0x1e0 May 04 10:57:06 deb4g kernel: [0000000000485fcc] kthread+0xac/0xe0 May 04 10:57:06 deb4g kernel: [00000000004060e4] ret_from_fork+0x1c/0x2c May 04 10:57:06 deb4g kernel: [0000000000000000] (null) May 04 10:57:06 deb4g kernel: ---[ end trace 1d473d9e3fa72407 ]--- May 04 10:57:06 deb4g kernel: VIO: Removing device vnet-port-0-5 May 04 10:57:06 deb4g kernel: \|/ ____ \|/ "@'/ .. \`@" /_| \__/ |_\ \__U_/ May 04 10:57:06 deb4g kernel: kldomd(178): Kernel illegal instruction [#1] May 04 10:57:06 deb4g kernel: CPU: 30 PID: 178 Comm: kldomd Tainted: G W E 4.5.0-2-sparc64-smp #1 Debian 4.5.2-1 May 04 10:57:06 deb4g kernel: task: fff8000fff4449e0 ti: fff8000fff47c000 task.ti: fff8000fff47c000 May 04 10:57:06 deb4g kernel: TSTATE: 0000004480e01605 TPC: 0000000000ba9e30 TNPC: 0000000000ba9e34 Y: 0000299c Tainted: G W E May 04 10:57:06 deb4g kernel: TPC: <mdesc_memblock_free+0x0/0x74> May 04 10:57:06 deb4g kernel: g0: 0000000000a3d1c0 g1: 0000000000ba9e30 g2: 0000000000000000 g3: 0000000000000000 May 04 10:57:06 deb4g kernel: g4: fff8000fff4449e0 g5: fff800102d9d2000 g6: fff8000fff47c000 g7: 0000000000000001 May 04 10:57:06 deb4g kernel: o0: fff800102ff12000 o1: 0000000000b02000 o2: 0000000000000001 o3: 0000000000450700 May 04 10:57:06 deb4g kernel: o4: 0000000000a93df0 o5: 00000000000006dc sp: fff8000fff47f301 ret_pc: 000000000043d12c May 04 10:57:06 deb4g kernel: RPC: <mdesc_update+0x10c/0x1a0> May 04 10:57:06 deb4g kernel: l0: fff8001001429140 l1: 0000000000c10100 l2: fff8000ff9b5fb40 l3: 0000000000004000 May 04 10:57:06 deb4g kernel: l4: 0000000000000000 l5: 0000000000000000 l6: 0000000000000000 l7: 0000000000000008 May 04 10:57:06 deb4g kernel: i0: 0000000000000021 i1: 0000000000b02000 i2: 0000000000c2b800 i3: fff800102ff12000 May 04 10:57:06 deb4g kernel: i4: fff8000ffc740000 i5: 0000000000000000 i6: fff8000fff47f3c1 i7: 0000000000452a60 May 04 10:57:06 deb4g kernel: I7: <md_update_data+0x20/0x60> May 04 10:57:06 deb4g kernel: Call Trace: May 04 10:57:06 deb4g kernel: [0000000000452a60] md_update_data+0x20/0x60 May 04 10:57:06 deb4g kernel: [0000000000452008] ds_thread+0x1a8/0x1e0 May 04 10:57:06 deb4g kernel: [0000000000485fcc] kthread+0xac/0xe0 May 04 10:57:06 deb4g kernel: [00000000004060e4] ret_from_fork+0x1c/0x2c May 04 10:57:06 deb4g kernel: [0000000000000000] (null) May 04 10:57:06 deb4g kernel: Disabling lock debugging due to kernel taint May 04 10:57:06 deb4g kernel: Caller[0000000000452a60]: md_update_data+0x20/0x60 May 04 10:57:06 deb4g kernel: Caller[0000000000452008]: ds_thread+0x1a8/0x1e0 May 04 10:57:06 deb4g kernel: Caller[0000000000485fcc]: kthread+0xac/0xe0 May 04 10:57:06 deb4g kernel: Caller[00000000004060e4]: ret_from_fork+0x1c/0x2c May 04 10:57:06 deb4g kernel: Caller[0000000000000000]: (null) May 04 10:57:06 deb4g kernel: Instruction DUMP: 00000000 00000000 00000000 <00000000> 00000000 00000000 00000000 00000000 00000000 May 04 10:57:09 deb4g kernel: ------------[ cut here ]------------ May 04 10:57:09 deb4g kernel: WARNING: CPU: 1 PID: 0 at /build/linux-niWLGx/linux-4.5.2/net/sched/sch_generic.c:303 dev_watchdog+0x26c/0x280() May 04 10:57:09 deb4g kernel: NETDEV WATCHDOG: eth0 (vnet_port): transmit queue 5 timed out May 04 10:57:09 deb4g kernel: Modules linked in: tun(E) camellia_sparc64(E) des_sparc64(E) des_generic(E) md5_sparc64(E) sha512_sparc64(E) sha256_sp May 04 10:57:09 deb4g kernel: CPU: 1 PID: 0 Comm: swapper/1 Tainted: G D W E 4.5.0-2-sparc64-smp #1 Debian 4.5.2-1 May 04 10:57:09 deb4g kernel: Call Trace: May 04 10:57:09 deb4g kernel: [00000000004669d0] warn_slowpath_common+0x70/0xc0 May 04 10:57:09 deb4g kernel: [0000000000466a50] warn_slowpath_fmt+0x30/0x40 May 04 10:57:09 deb4g kernel: [000000000088050c] dev_watchdog+0x26c/0x280 May 04 10:57:09 deb4g kernel: [00000000004ce638] call_timer_fn+0x18/0x160 May 04 10:57:09 deb4g kernel: [00000000004ce994] run_timer_softirq+0x214/0x2e0 May 04 10:57:09 deb4g kernel: [000000000046b340] __do_softirq+0xe0/0x2e0 May 04 10:57:09 deb4g kernel: [000000000042c014] do_softirq_own_stack+0x34/0x60 May 04 10:57:09 deb4g kernel: [000000000046b728] irq_exit+0xa8/0xc0 May 04 10:57:09 deb4g kernel: [000000000096b968] timer_interrupt+0x88/0xe0 May 04 10:57:09 deb4g kernel: [00000000004209d4] tl0_irq14+0x14/0x20 May 04 10:57:09 deb4g kernel: [000000000042c7dc] arch_cpu_idle+0x7c/0xa0 May 04 10:57:09 deb4g kernel: [00000000004a87a8] default_idle_call+0x28/0x60 May 04 10:57:09 deb4g kernel: [00000000004a8a48] cpu_startup_entry+0x268/0x320 May 04 10:57:09 deb4g kernel: [000000000043f154] smp_callin+0x114/0x160 May 04 10:57:09 deb4g kernel: [0000000000b02974] 0xb02974 May 04 10:57:09 deb4g kernel: [0000000000000000] (null) May 04 10:57:09 deb4g kernel: ---[ end trace 1d473d9e3fa72408 ]---
Jun 15 22:49:27 landau.east.ru kernel: ds-0: Machine description update. Jun 15 22:49:27 landau.east.ru kernel: VIO: Removing device vnet-port-0-2 Jun 15 22:49:27 landau.east.ru kernel: \|/ ____ \|/ "@'/ .. \`@" /_| \__/ |_\ \__U_/ Jun 15 22:49:27 landau.east.ru kernel: kldomd(789): Kernel illegal instruction [#1] Jun 15 22:49:27 landau.east.ru kernel: CPU: 120 PID: 789 Comm: kldomd Not tainted 4.6.0-1-sparc64-smp #1 Debian 4.6.1-1 Jun 15 22:49:27 landau.east.ru kernel: task: fff800202210ef60 ti: fff8002022114000 task.ti: fff8002022114000 Jun 15 22:49:27 landau.east.ru kernel: TSTATE: 0000004480e01605 TPC: 0000000000ba3e50 TNPC: 0000000000ba3e54 Y: 0000001b Not tainted Jun 15 22:49:27 landau.east.ru kernel: TPC: <mdesc_memblock_free+0x0/0x74> Jun 15 22:49:27 landau.east.ru kernel: g0: 0000000000a34160 g1: 0000000000ba3e50 g2: 0000000000000000 g3: 0000000000000000 Jun 15 22:49:27 landau.east.ru kernel: g4: fff800202210ef60 g5: fff800207d6f8000 g6: fff8002022114000 g7: 0000000000000001 Jun 15 22:49:27 landau.east.ru kernel: o0: fff800207fec4000 o1: 0000000000afa400 o2: 0000000000000001 o3: 00000000004507a0 Jun 15 22:49:27 landau.east.ru kernel: o4: 0000000000a8b240 o5: 00000000000016be sp: fff8002022117301 ret_pc: 000000000043d12c Jun 15 22:49:27 landau.east.ru kernel: RPC: <mdesc_update+0x10c/0x1a0> Jun 15 22:49:27 landau.east.ru kernel: l0: fff8002025225b00 l1: 0000000080001604 l2: fff8001ced012860 l3: 0000000000000400 Jun 15 22:49:27 landau.east.ru kernel: l4: 0000000000000000 l5: 0000000000000000 l6: 0000000000000000 l7: 0000000000000008 Jun 15 22:49:27 landau.east.ru kernel: i0: 0000000000000021 i1: 0000000000afa400 i2: 0000000000c25800 i3: fff800207fec4000 Jun 15 22:49:27 landau.east.ru kernel: i4: fff80011ef280000 i5: 0000000000000000 i6: fff80020221173c1 i7: 0000000000452b00 Jun 15 22:49:27 landau.east.ru kernel: I7: <md_update_data+0x20/0x60> Jun 15 22:49:27 landau.east.ru kernel: Call Trace: Jun 15 22:49:27 landau.east.ru kernel: [0000000000452b00] md_update_data+0x20/0x60 Jun 15 22:49:27 landau.east.ru kernel: [00000000004520a8] ds_thread+0x1a8/0x1e0 Jun 15 22:49:27 landau.east.ru kernel: [000000000048786c] kthread+0xac/0xe0 Jun 15 22:49:27 landau.east.ru kernel: [00000000004060a4] ret_from_fork+0x1c/0x2c Jun 15 22:49:27 landau.east.ru kernel: [0000000000000000] (null) Jun 15 22:49:27 landau.east.ru kernel: Disabling lock debugging due to kernel taint Jun 15 22:49:27 landau.east.ru kernel: Caller[0000000000452b00]: md_update_data+0x20/0x60 Jun 15 22:49:27 landau.east.ru kernel: Caller[00000000004520a8]: ds_thread+0x1a8/0x1e0 Jun 15 22:49:27 landau.east.ru kernel: Caller[000000000048786c]: kthread+0xac/0xe0 Jun 15 22:49:27 landau.east.ru kernel: Caller[00000000004060a4]: ret_from_fork+0x1c/0x2c Jun 15 22:49:27 landau.east.ru kernel: Caller[0000000000000000]: (null) Jun 15 22:49:27 landau.east.ru kernel: Instruction DUMP: 6ffffef5 00000000 00000210 <00000000> 00000005 00000000 00004058 00000000 00000006 Jun 15 22:49:28 landau.east.ru kernel: ------------[ cut here ]------------ Jun 15 22:49:28 landau.east.ru kernel: WARNING: CPU: 98 PID: 0 at /build/linux-PVkSnE/linux-4.6.1/net/sched/sch_generic.c:306 dev_watchdog+0x274/0x2a0 Jun 15 22:49:28 landau.east.ru kernel: NETDEV WATCHDOG: eth0 (vnet_port): transmit queue 2 timed out Jun 15 22:49:28 landau.east.ru kernel: Modules linked in: tun xt_tcpudp xt_multiport xt_conntrack iptable_filter iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack ip_tables x_tables n2_rng camellia_sparc64 des_sparc64 des_generic rng_core md5_sparc64 sha512_sparc64 sha256_sparc64 sha1_sparc64 autofs4 ext4 ecb crc16 jbd2 mbcache btrfs crc32c_generic xor zlib_deflate raid6_pq crc32c_sparc64 aes_sparc64 sunvnet sunvdc Jun 15 22:49:28 landau.east.ru kernel: CPU: 98 PID: 0 Comm: swapper/98 Tainted: G D 4.6.0-1-sparc64-smp #1 Debian 4.6.1-1 Jun 15 22:49:28 landau.east.ru kernel: Call Trace: Jun 15 22:49:28 landau.east.ru kernel: [0000000000466cc0] __warn+0xc0/0xe0 Jun 15 22:49:28 landau.east.ru kernel: [0000000000466d14] warn_slowpath_fmt+0x34/0x60 Jun 15 22:49:28 landau.east.ru kernel: [0000000000889bb4] dev_watchdog+0x274/0x2a0 Jun 15 22:49:28 landau.east.ru kernel: [00000000004d0898] call_timer_fn+0x18/0x160 Jun 15 22:49:28 landau.east.ru kernel: [00000000004d0bf4] run_timer_softirq+0x214/0x2e0 Jun 15 22:49:28 landau.east.ru kernel: [0000000000976a80] __do_softirq+0xe0/0x2e0 Jun 15 22:49:28 landau.east.ru kernel: [000000000042c014] do_softirq_own_stack+0x34/0x60 Jun 15 22:49:28 landau.east.ru kernel: [000000000046cdc8] irq_exit+0xa8/0xc0 Jun 15 22:49:28 landau.east.ru kernel: [0000000000976728] timer_interrupt+0x88/0xe0 Jun 15 22:49:28 landau.east.ru kernel: [00000000004209d4] tl0_irq14+0x14/0x20 Jun 15 22:49:28 landau.east.ru kernel: [000000000042c7dc] arch_cpu_idle+0x7c/0xa0 Jun 15 22:49:28 landau.east.ru kernel: [00000000004aa048] default_idle_call+0x28/0x60 Jun 15 22:49:28 landau.east.ru kernel: [00000000004aa2e8] cpu_startup_entry+0x268/0x2e0 Jun 15 22:49:28 landau.east.ru kernel: [000000000043f194] smp_callin+0x114/0x160 Jun 15 22:49:28 landau.east.ru kernel: [0000000000afae74] 0xafae74 Jun 15 22:49:28 landau.east.ru kernel: [0000000000000000] (null) Jun 15 22:49:28 landau.east.ru kernel: ---[ end trace 1121ad02337165b3 ]---
Aug 01 15:47:18 ttip kernel: ds-0: Machine description update. Aug 01 15:47:18 ttip kernel: VIO: Adding device vnet-port-0-5 Aug 01 15:47:18 ttip kernel: sunvnet: eth0: PORT ( remote-mac 00:14:4f:f9:5a:4b ) Aug 01 15:47:56 ttip kernel: ds-0: Machine description update. Aug 01 15:47:56 ttip kernel: VIO: Removing device vnet-port-0-5 Aug 01 15:47:57 ttip kernel: ------------[ cut here ]------------ Aug 01 15:47:57 ttip kernel: WARNING: CPU: 17 PID: 0 at /build/linux-LiNZ0v/linux-4.7~rc7/net/sched/sch_generic.c:272 dev_watchdog+0x26c/0x280 Aug 01 15:47:57 ttip kernel: NETDEV WATCHDOG: eth0 (vnet_port): transmit queue 5 timed out Aug 01 15:47:57 ttip kernel: Modules linked in: xfs libcrc32c camellia_sparc64 n2_rng rng_core des_sparc64 flash des_generic md5_sparc64 sha512_sparc64 sha256_sparc64 sha1_sparc64 autofs4 ext4 ecb crc16 jbd2 crc32c_generic mbcache crc32c_sparc64 aes_sparc64 sunvnet sunvdc Aug 01 15:47:57 ttip kernel: CPU: 17 PID: 0 Comm: swapper/17 Not tainted 4.7.0-rc7-sparc64-smp #1 Debian 4.7~rc7-1~exp1 Aug 01 15:47:57 ttip kernel: Call Trace: Aug 01 15:47:57 ttip kernel: [0000000000467260] __warn+0xc0/0xe0 Aug 01 15:47:57 ttip kernel: [00000000004672b4] warn_slowpath_fmt+0x34/0x60 Aug 01 15:47:57 ttip kernel: [000000000089386c] dev_watchdog+0x26c/0x280 Aug 01 15:47:57 ttip kernel: [00000000004d1918] call_timer_fn+0x18/0x160 Aug 01 15:47:57 ttip kernel: [00000000004d1c74] run_timer_softirq+0x214/0x2e0 Aug 01 15:47:57 ttip kernel: [0000000000980e00] __do_softirq+0xe0/0x2e0 Aug 01 15:47:57 ttip kernel: [000000000042c134] do_softirq_own_stack+0x34/0x60 Aug 01 15:47:57 ttip kernel: [000000000046d370] irq_exit+0xb0/0xc0 Aug 01 15:47:57 ttip kernel: [0000000000980aa8] timer_interrupt+0x88/0xe0 Aug 01 15:47:57 ttip kernel: [00000000004209d4] tl0_irq14+0x14/0x20 Aug 01 15:47:57 ttip kernel: [000000000042c8fc] arch_cpu_idle+0x7c/0xa0 Aug 01 15:47:57 ttip kernel: [00000000004aa488] default_idle_call+0x28/0x60 Aug 01 15:47:57 ttip kernel: [00000000004aa728] cpu_startup_entry+0x268/0x2e0 Aug 01 15:47:57 ttip kernel: [000000000043f2c4] smp_callin+0x104/0x140 Aug 01 15:47:57 ttip kernel: [0000000000b0a3b4] 0xb0a3b4 Aug 01 15:47:57 ttip kernel: [0000000000000000] (null) Aug 01 15:47:57 ttip kernel: ---[ end trace e5077db2224615f2 ]---
binding/unbinding another LDOM, vsw (virtual switch) creates same vnet-port, which bugs linux kernel, who does not free vnet-port on unbind. Aug 04 12:32:13 deb4g kernel: ds-0: Machine description update. Aug 04 12:32:13 deb4g kernel: VIO: Adding device vnet-port-0-4 Aug 04 12:32:13 deb4g kernel: ------------[ cut here ]------------ Aug 04 12:32:13 deb4g kernel: WARNING: CPU: 43 PID: 405 at /build/linux-PVkSnE/linux-4.6.1/fs/sysfs/dir.c:31 sysfs_warn_dup+0x58/0x80 Aug 04 12:32:13 deb4g kernel: sysfs: cannot create duplicate filename '/devices/channel-devices/vnet-port-0-4' Aug 04 12:32:13 deb4g kernel: Modules linked in: algif_skcipher algif_aead algif_hash af_alg sha256_generic binfmt_misc fuse dm_mirror dm_region_hash dm_log tun nfsd auth_rpcgss oid_registry nfs_acl nfs lockd grace fscache sunrpc camellia_sparc64 des_sparc64 des_generic md5_sparc64 n2_rng sha512_sparc64 rng_core sha256_sparc64 sha1_sparc64 dm_mod autofs4 ext4 ecb crc16 jbd2 mbcache btrfs crc32c_generic xor zlib_deflate raid6_pq crc32c_sparc64 aes_sparc64 sunvnet sunvdc [last unloaded: cryptd] Aug 04 12:32:13 deb4g kernel: CPU: 43 PID: 405 Comm: kldomd Tainted: G W 4.6.0-1-sparc64-smp #1 Debian 4.6.1-1 Aug 04 12:32:13 deb4g kernel: Call Trace: Aug 04 12:32:13 deb4g kernel: [0000000000466cc0] __warn+0xc0/0xe0 Aug 04 12:32:13 deb4g kernel: [0000000000466d14] warn_slowpath_fmt+0x34/0x60 Aug 04 12:32:13 deb4g kernel: [0000000000653578] sysfs_warn_dup+0x58/0x80 Aug 04 12:32:13 deb4g kernel: [0000000000653688] sysfs_create_dir_ns+0x88/0xa0 Aug 04 12:32:13 deb4g kernel: [00000000007025e0] kobject_add_internal+0xa0/0x3a0 Aug 04 12:32:13 deb4g kernel: [0000000000702d6c] kobject_add+0x4c/0xa0 Aug 04 12:32:13 deb4g kernel: [00000000007c3f20] device_add+0xe0/0x5e0 Aug 04 12:32:13 deb4g kernel: [00000000007c4434] device_register+0x14/0x40 Aug 04 12:32:13 deb4g kernel: [0000000000450490] vio_create_one+0x2f0/0x540 Aug 04 12:32:13 deb4g kernel: [00000000004507bc] vio_add+0x1c/0x60 Aug 04 12:32:13 deb4g kernel: [000000000043c194] invoke_on_missing+0x114/0x200 Aug 04 12:32:13 deb4g kernel: [000000000043d0ec] mdesc_update+0xcc/0x1a0 Aug 04 12:32:13 deb4g kernel: [0000000000452b00] md_update_data+0x20/0x60 Aug 04 12:32:13 deb4g kernel: [00000000004520a8] ds_thread+0x1a8/0x1e0 Aug 04 12:32:13 deb4g kernel: [000000000048786c] kthread+0xac/0xe0 Aug 04 12:32:13 deb4g kernel: [00000000004060a4] ret_from_fork+0x1c/0x2c Aug 04 12:32:13 deb4g kernel: ---[ end trace 5ab633ea59af2e74 ]--- Aug 04 12:32:13 deb4g kernel: ------------[ cut here ]------------ Aug 04 12:32:13 deb4g kernel: WARNING: CPU: 43 PID: 405 at /build/linux-PVkSnE/linux-4.6.1/lib/kobject.c:240 kobject_add_internal+0x300/0x3a0 Aug 04 12:32:13 deb4g kernel: kobject_add_internal failed for vnet-port-0-4 with -EEXIST, don't try to register things with the same name in the same directory. Aug 04 12:32:13 deb4g kernel: Modules linked in: algif_skcipher algif_aead algif_hash af_alg sha256_generic binfmt_misc fuse dm_mirror dm_region_hash dm_log tun nfsd auth_rpcgss oid_registry nfs_acl nfs lockd grace fscache sunrpc camellia_sparc64 des_sparc64 des_generic md5_sparc64 n2_rng sha512_sparc64 rng_core sha256_sparc64 sha1_sparc64 dm_mod autofs4 ext4 ecb crc16 jbd2 mbcache btrfs crc32c_generic xor zlib_deflate raid6_pq crc32c_sparc64 aes_sparc64 sunvnet sunvdc [last unloaded: cryptd] Aug 04 12:32:13 deb4g kernel: CPU: 43 PID: 405 Comm: kldomd Tainted: G W 4.6.0-1-sparc64-smp #1 Debian 4.6.1-1 Aug 04 12:32:13 deb4g kernel: Call Trace: Aug 04 12:32:13 deb4g kernel: [0000000000466cc0] __warn+0xc0/0xe0 Aug 04 12:32:13 deb4g kernel: [0000000000466d14] warn_slowpath_fmt+0x34/0x60 Aug 04 12:32:13 deb4g kernel: [0000000000702840] kobject_add_internal+0x300/0x3a0 Aug 04 12:32:13 deb4g kernel: [0000000000702d6c] kobject_add+0x4c/0xa0 Aug 04 12:32:13 deb4g kernel: [00000000007c3f20] device_add+0xe0/0x5e0 Aug 04 12:32:13 deb4g kernel: [00000000007c4434] device_register+0x14/0x40 Aug 04 12:32:13 deb4g kernel: [0000000000450490] vio_create_one+0x2f0/0x540 Aug 04 12:32:13 deb4g kernel: [00000000004507bc] vio_add+0x1c/0x60 Aug 04 12:32:13 deb4g kernel: [000000000043c194] invoke_on_missing+0x114/0x200 Aug 04 12:32:13 deb4g kernel: [000000000043d0ec] mdesc_update+0xcc/0x1a0 Aug 04 12:32:13 deb4g kernel: [0000000000452b00] md_update_data+0x20/0x60 Aug 04 12:32:13 deb4g kernel: [00000000004520a8] ds_thread+0x1a8/0x1e0 Aug 04 12:32:13 deb4g kernel: [000000000048786c] kthread+0xac/0xe0 Aug 04 12:32:13 deb4g kernel: [00000000004060a4] ret_from_fork+0x1c/0x2c Aug 04 12:32:13 deb4g kernel: [0000000000000000] (null) Aug 04 12:32:13 deb4g kernel: ---[ end trace 5ab633ea59af2e75 ]--- Aug 04 12:32:13 deb4g kernel: VIO: Could not register device vnet-port-0-4, err=-17
unbind another domain at 9:57 and bind it back at 10:21 Sep 10 09:57:33 landau kernel: ds-0: Machine description update. Sep 10 09:57:33 landau kernel: VIO: Removing device vnet-port-0-4 Sep 10 09:57:33 landau kernel: ------------[ cut here ]------------ Sep 10 09:57:33 landau kernel: WARNING: CPU: 40 PID: 0 at /build/linux-LiNZ0v/linux-4.7~rc7/net/sched/sch_generic.c:272 dev_watchdog+0x26c/0x280 Sep 10 09:57:33 landau kernel: NETDEV WATCHDOG: eth0 (vnet_port): transmit queue 4 timed out Sep 10 09:57:33 landau kernel: Modules linked in: tun xt_tcpudp xt_multiport xt_conntrack iptable_filter iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_c Sep 10 09:57:33 landau kernel: CPU: 40 PID: 0 Comm: swapper/40 Not tainted 4.7.0-rc7-sparc64-smp #1 Debian 4.7~rc7-1~exp1 Sep 10 09:57:33 landau kernel: Call Trace: Sep 10 09:57:33 landau kernel: [0000000000467260] __warn+0xc0/0xe0 Sep 10 09:57:33 landau kernel: [00000000004672b4] warn_slowpath_fmt+0x34/0x60 Sep 10 09:57:33 landau kernel: [000000000089386c] dev_watchdog+0x26c/0x280 Sep 10 09:57:33 landau kernel: [00000000004d1918] call_timer_fn+0x18/0x160 Sep 10 09:57:33 landau kernel: [00000000004d1c74] run_timer_softirq+0x214/0x2e0 Sep 10 09:57:33 landau kernel: [0000000000980e00] __do_softirq+0xe0/0x2e0 Sep 10 09:57:33 landau kernel: [000000000042c134] do_softirq_own_stack+0x34/0x60 Sep 10 09:57:33 landau kernel: [000000000046d370] irq_exit+0xb0/0xc0 Sep 10 09:57:33 landau kernel: [0000000000980aa8] timer_interrupt+0x88/0xe0 Sep 10 09:57:33 landau kernel: [00000000004209d4] tl0_irq14+0x14/0x20 Sep 10 09:57:33 landau kernel: [000000000042c8fc] arch_cpu_idle+0x7c/0xa0 Sep 10 09:57:33 landau kernel: [00000000004aa488] default_idle_call+0x28/0x60 Sep 10 09:57:33 landau kernel: [00000000004aa728] cpu_startup_entry+0x268/0x2e0 Sep 10 09:57:33 landau kernel: [000000000043f2c4] smp_callin+0x104/0x140 Sep 10 09:57:33 landau kernel: [0000000000b0a3b4] 0xb0a3b4 Sep 10 09:57:33 landau kernel: [0000000000000000] (null) Sep 10 09:57:33 landau kernel: ---[ end trace ea82c851d776e996 ]--- Sep 10 10:21:13 landau kernel: ds-0: Machine description update. Sep 10 10:21:13 landau kernel: VIO: Adding device vnet-port-0-4 Sep 10 10:21:13 landau kernel: sunvnet: eth0: PORT ( remote-mac 00:14:4f:f8:12:a3 ) this stack trace does not affect domain work afterwards.
Jan 16 12:37:40 landau kernel: ds-0: Machine description update. Jan 16 12:37:40 landau kernel: VIO: Adding device vnet-port-0-5 Jan 16 12:37:40 landau kernel: sunvnet: eth0: PORT ( remote-mac 00:14:4f:fa:41:b1 ) Jan 16 14:53:06 landau kernel: ds-0: Machine description update. Jan 16 14:53:06 landau kernel: VIO: Removing device vnet-port-0-5 Jan 16 14:53:08 landau kernel: ------------[ cut here ]------------ Jan 16 14:53:08 landau kernel: WARNING: CPU: 61 PID: 0 at net/sched/sch_generic.c:316 dev_watchdog+0x26c/0x280 Jan 16 14:53:08 landau kernel: NETDEV WATCHDOG: eth0 (vnet_port): transmit queue 5 timed out Jan 16 14:53:08 landau kernel: Modules linked in: dccp_ipv4 dccp netlink_diag unix_diag tcp_diag inet_diag tun xt_tcpudp xt_multiport xt_conntrack iptable_filter iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack n2_rng flash rng_core camellia_sparc64 des_sparc64 des_generic aes_sparc64 md5_sparc64 sha512_sparc64 sha256_sparc64 sha1_sparc64 ip_tables x_tables autofs4 ext4 crc16 jbd2 fscrypto mbcache btrfs xor zlib_deflate raid6_pq crc32c_sparc64 sunvnet sunvdc Jan 16 14:53:08 landau kernel: CPU: 61 PID: 0 Comm: swapper/61 Tainted: G L 4.9.0-rc5+ #2 Jan 16 14:53:08 landau kernel: Call Trace: Jan 16 14:53:08 landau kernel: [0000000000468520] __warn+0xc0/0xe0 Jan 16 14:53:08 landau kernel: [0000000000468574] warn_slowpath_fmt+0x34/0x60 Jan 16 14:53:08 landau kernel: [000000000094d1ec] dev_watchdog+0x26c/0x280 Jan 16 14:53:08 landau kernel: [0000000000500564] call_timer_fn+0x84/0x440 Jan 16 14:53:08 landau kernel: [0000000000500b10] expire_timers+0x1f0/0x2a0 Jan 16 14:53:08 landau kernel: [0000000000500d04] run_timer_softirq+0x84/0xe0 Jan 16 14:53:08 landau kernel: [0000000000a72bb8] __do_softirq+0x138/0x5c0 Jan 16 14:53:08 landau kernel: [000000000042c1b4] do_softirq_own_stack+0x34/0x60 Jan 16 14:53:08 landau kernel: [0000000000470cc8] irq_exit+0xc8/0x100 Jan 16 14:53:08 landau kernel: [0000000000a727e8] timer_interrupt+0x88/0xe0 Jan 16 14:53:08 landau kernel: [0000000000426bf4] sys_call_table+0x654/0x820 Jan 16 14:53:08 landau kernel: [000000000042c980] arch_cpu_idle+0xa0/0xc0 Jan 16 14:53:08 landau kernel: [0000000000a6fd88] default_idle_call+0x28/0x60 Jan 16 14:53:08 landau kernel: [00000000004c0154] cpu_startup_entry+0xf4/0x1e0 Jan 16 14:53:08 landau kernel: [000000000043edb8] smp_callin+0x118/0x160 Jan 16 14:53:08 landau kernel: [0000000000c86824] after_lock_tlb+0x1a8/0x1bc Jan 16 14:53:08 landau kernel: ---[ end trace c50434d647ae1d18 ]---
Feb 24 11:39:29 ttip kernel: ds-0: Machine description update. Feb 24 11:39:29 ttip kernel: VIO: Removing device vnet-port-0-2 Feb 24 11:39:30 ttip kernel: \|/ ____ \|/ "@'/ .. \`@" /_| \__/ |_\ \__U_/ Feb 24 11:39:30 ttip kernel: kldomd(217): Kernel illegal instruction [#1] Feb 24 11:39:30 ttip kernel: CPU: 29 PID: 217 Comm: kldomd Not tainted 4.10.0-06476-gbc49a7831b11 #72 Feb 24 11:39:30 ttip kernel: task: fff8000811bf9c00 task.stack: fff8000811bfc000 Feb 24 11:39:30 ttip kernel: TSTATE: 0000004480e01605 TPC: 0000000000d51eec TNPC: 0000000000d51ef0 Y: 00000058 Not tainted Feb 24 11:39:30 ttip kernel: TPC: <mdesc_memblock_free+0x0/0x74> Feb 24 11:39:30 ttip kernel: g0: 0000000000bc4308 g1: 0000000000d51eec g2: 00000000ffffffff g3: 000000000000000d Feb 24 11:39:30 ttip kernel: g4: fff8000811bf9c00 g5: fff800082c5d2000 g6: fff8000811bfc000 g7: 0000000000000001 Feb 24 11:39:30 ttip kernel: o0: fff800082f866000 o1: fff800082f866020 o2: 0000000000000001 o3: 0000000000451220 Feb 24 11:39:30 ttip kernel: o4: 0000000000c26be8 o5: 0000000000c863c8 sp: fff8000811bff361 ret_pc: 000000000043d004 Feb 24 11:39:30 ttip kernel: RPC: <mdesc_update+0x144/0x1c0> Feb 24 11:39:30 ttip kernel: l0: 0000000001601400 l1: 000000000000000e l2: 0000000000000001 l3: fff8000811bfa3f8 Feb 24 11:39:30 ttip kernel: l4: 00000fff00000000 l5: 0006000000000000 l6: 0000000000000000 l7: 0000000000000000 Feb 24 11:39:30 ttip kernel: i0: 0000000000000021 i1: 0000000000c86000 i2: 0000000000c86000 i3: fff800080eb40000 Feb 24 11:39:30 ttip kernel: i4: fff800082f866000 i5: 0000000000000000 i6: fff8000811bff421 i7: 00000000004535e0 Feb 24 11:39:30 ttip kernel: I7: <md_update_data+0x20/0x60> Feb 24 11:39:30 ttip kernel: Call Trace: Feb 24 11:39:30 ttip kernel: [00000000004535e0] md_update_data+0x20/0x60 Feb 24 11:39:30 ttip kernel: [0000000000452b98] ds_thread+0x1b8/0x1e0 Feb 24 11:39:30 ttip kernel: [000000000049282c] kthread+0xec/0x140 Feb 24 11:39:30 ttip kernel: [0000000000406084] ret_from_fork+0x1c/0x2c Feb 24 11:39:30 ttip kernel: [0000000000000000] (null) Feb 24 11:39:30 ttip kernel: Disabling lock debugging due to kernel taint Feb 24 11:39:30 ttip kernel: Caller[00000000004535e0]: md_update_data+0x20/0x60 Feb 24 11:39:30 ttip kernel: Caller[0000000000452b98]: ds_thread+0x1b8/0x1e0 Feb 24 11:39:30 ttip kernel: Caller[000000000049282c]: kthread+0xec/0x140 Feb 24 11:39:30 ttip kernel: Caller[0000000000406084]: ret_from_fork+0x1c/0x2c Feb 24 11:39:30 ttip kernel: Caller[0000000000000000]: (null) Feb 24 11:39:30 ttip kernel: Instruction DUMP: Feb 24 11:39:30 ttip kernel: 00000000 Feb 24 11:39:30 ttip kernel: 00000000 Feb 24 11:39:30 ttip kernel: 00000000 Feb 24 11:39:30 ttip kernel: <00000000> Feb 24 11:39:30 ttip kernel: 00000000 Feb 24 11:39:30 ttip kernel: 00000000 Feb 24 11:39:30 ttip kernel: 00000000 Feb 24 11:39:30 ttip kernel: 00000000 Feb 24 11:39:30 ttip kernel: a4810000 Feb 24 11:39:30 ttip kernel: Feb 24 11:39:30 ttip kernel: BUG: sleeping function called from invalid context at ./include/linux/sched.h:3147 Feb 24 11:39:30 ttip kernel: in_atomic(): 1, irqs_disabled(): 1, pid: 217, name: kldomd Feb 24 11:39:30 ttip kernel: INFO: lockdep is turned off. Feb 24 11:39:30 ttip kernel: irq event stamp: 222 Feb 24 11:39:30 ttip kernel: hardirqs last enabled at (221): [<000000000062571c>] kfree+0xbc/0x280 Feb 24 11:39:30 ttip kernel: hardirqs last disabled at (222): [<0000000000a8aef8>] _raw_spin_lock_irqsave+0x18/0x60 Feb 24 11:39:30 ttip kernel: softirqs last enabled at (202): [<000000000091430c>] peernet2id+0x2c/0x40 Feb 24 11:39:30 ttip kernel: softirqs last disabled at (200): [<00000000009142ec>] peernet2id+0xc/0x40 Feb 24 11:39:30 ttip kernel: CPU: 29 PID: 217 Comm: kldomd Tainted: G D 4.10.0-06476-gbc49a7831b11 #72 Feb 24 11:39:30 ttip kernel: Call Trace: Feb 24 11:39:30 ttip kernel: [000000000049c280] ___might_sleep+0x160/0x280 Feb 24 11:39:30 ttip kernel: [000000000049c3e8] __might_sleep+0x48/0xa0 Feb 24 11:39:30 ttip kernel: [000000000047e9d8] exit_signals+0x18/0x280 Feb 24 11:39:30 ttip kernel: [000000000046f710] do_exit+0x90/0xd20 Feb 24 11:39:30 ttip kernel: [0000000000429fec] die_if_kernel+0x16c/0x300 Feb 24 11:39:30 ttip kernel: [000000000042af5c] do_illegal_instruction+0x17c/0x1a0 Feb 24 11:39:30 ttip kernel: [0000000000420210] tl0_ill+0x10/0x20 Feb 24 11:39:30 ttip kernel: [0000000000d51eec] mdesc_memblock_free+0x0/0x74 Feb 24 11:39:30 ttip kernel: [00000000004535e0] md_update_data+0x20/0x60 Feb 24 11:39:30 ttip kernel: [0000000000452b98] ds_thread+0x1b8/0x1e0 Feb 24 11:39:30 ttip kernel: [000000000049282c] kthread+0xec/0x140 Feb 24 11:39:30 ttip kernel: [0000000000406084] ret_from_fork+0x1c/0x2c Feb 24 11:39:30 ttip kernel: [0000000000000000] (null) Feb 24 11:39:30 ttip kernel: note: kldomd[217] exited with preempt_count 1 Feb 24 11:39:34 ttip kernel: ------------[ cut here ]------------ Feb 24 11:39:34 ttip kernel: WARNING: CPU: 3 PID: 0 at net/sched/sch_generic.c:316 dev_watchdog+0x26c/0x280 Feb 24 11:39:34 ttip kernel: NETDEV WATCHDOG: eth0 (vnet_port): transmit queue 2 timed out Feb 24 11:39:34 ttip kernel: Modules linked in: btrfs zlib_deflate camellia_sparc64 des_sparc64 des_generic flash aes_sparc64 md5_sparc64 sha512_sparc64 sha Feb 24 11:39:34 ttip kernel: CPU: 3 PID: 0 Comm: swapper/3 Tainted: G D W 4.10.0-06476-gbc49a7831b11 #72 Feb 24 11:39:34 ttip kernel: Call Trace: Feb 24 11:39:34 ttip kernel: [0000000000469180] __warn+0xc0/0xe0 Feb 24 11:39:34 ttip kernel: [00000000004691d4] warn_slowpath_fmt+0x34/0x60 Feb 24 11:39:34 ttip kernel: [000000000095c8ac] dev_watchdog+0x26c/0x280 Feb 24 11:39:34 ttip kernel: [00000000004fe084] call_timer_fn+0x84/0x440 Feb 24 11:39:34 ttip kernel: [00000000004fe624] expire_timers+0x1e4/0x260 Feb 24 11:39:34 ttip kernel: [00000000004fe7e4] run_timer_softirq+0x84/0xe0 Feb 24 11:39:34 ttip kernel: [0000000000a8db18] __do_softirq+0x138/0x5c0 Feb 24 11:39:34 ttip kernel: [000000000042c3d4] do_softirq_own_stack+0x34/0x60 Feb 24 11:39:34 ttip kernel: [00000000004716a8] irq_exit+0xc8/0x100 Feb 24 11:39:34 ttip kernel: [0000000000a8d748] timer_interrupt+0x88/0xe0 Feb 24 11:39:34 ttip kernel: [0000000000426bf4] sys_call_table+0x654/0x820 Feb 24 11:39:34 ttip kernel: [000000000042ca40] arch_cpu_idle+0xa0/0xc0 Feb 24 11:39:34 ttip kernel: [0000000000a8ad28] default_idle_call+0x28/0x60 Feb 24 11:39:34 ttip kernel: [00000000004c398c] do_idle+0xcc/0x1a0 Feb 24 11:39:34 ttip kernel: [00000000004c3de4] cpu_startup_entry+0x24/0x40 Feb 24 11:39:34 ttip kernel: [000000000043f198] smp_callin+0x118/0x160 Feb 24 11:39:34 ttip kernel: ---[ end trace ea8f3607ffbfddb2 ]---
still valid for 4.12.0-rc2-00049-gfde8e33d1068 May 23 15:27:15 ttip kernel: ds-0: Machine description update. May 23 15:27:15 ttip kernel: VIO: Removing device vnet-port-0-2 May 23 15:43:42 ttip kernel: ds-0: Machine description update. May 23 15:43:42 ttip kernel: VIO: Adding device vnet-port-0-2 May 23 15:43:42 ttip kernel: sunvnet: eth0: PORT ( remote-mac 00:14:4f:f8:38:39 ) May 23 15:43:59 ttip kernel: ds-0: Machine description update. May 23 15:43:59 ttip kernel: VIO: Removing device vnet-port-0-3 May 23 15:44:02 ttip kernel: ds-0: Machine description update. May 23 15:44:02 ttip kernel: VIO: Adding device vnet-port-0-2 May 23 15:44:02 ttip kernel: ------------[ cut here ]------------ May 23 15:44:02 ttip kernel: WARNING: CPU: 35 PID: 315 at fs/sysfs/dir.c:31 sysfs_warn_dup+0x58/0x80 May 23 15:44:02 ttip kernel: sysfs: cannot create duplicate filename '/devices/channel-devices/vnet-port-0-2' May 23 15:44:02 ttip kernel: Modules linked in: overlay xfs tun camellia_sparc64 des_sparc64 des_generic aes_sparc64 md5_sparc64 sha512_sparc64 sha2 56_sparc64 sha1_sparc64 n2_rng rng_core flash nf_nat_pptp nf_nat_proto_gre nf_conntrack_pptp nf_conntrack_proto_gre nf_nat nf_conntrack ip_tables x_ tables autofs4 ext4 crc16 jbd2 mbcache raid10 raid456 libcrc32c crc32c_generic async_raid6_recov async_memcpy async_pq raid6_pq async_xor xor async_ tx raid1 raid0 multipath linear md_mod crc32c_sparc64 sunvnet sunvdc May 23 15:44:02 ttip kernel: CPU: 35 PID: 315 Comm: kldomd Not tainted 4.12.0-rc2-00049-gfde8e33d1068-dirty #316 May 23 15:44:02 ttip kernel: Call Trace: May 23 15:44:02 ttip kernel: [000000000046b194] __warn+0xb4/0xe0 May 23 15:44:02 ttip kernel: [000000000046b1f4] warn_slowpath_fmt+0x34/0x60 May 23 15:44:02 ttip kernel: [00000000006eaeb8] sysfs_warn_dup+0x58/0x80 May 23 15:44:02 ttip kernel: [00000000006eafb8] sysfs_create_dir_ns+0x78/0xa0 May 23 15:44:02 ttip kernel: [00000000007bb678] kobject_add_internal+0x118/0x3a0 May 23 15:44:02 ttip kernel: [00000000007bb97c] kobject_add+0x7c/0xa0 May 23 15:44:02 ttip kernel: [000000000088c2a0] device_add+0x100/0x620 May 23 15:44:02 ttip kernel: [000000000088c7d4] device_register+0x14/0x40 May 23 15:44:02 ttip kernel: [0000000000450b4c] vio_create_one+0x42c/0x540 May 23 15:44:02 ttip kernel: [0000000000450d1c] vio_add+0x1c/0x40 May 23 15:44:02 ttip kernel: [000000000043c04c] invoke_on_missing+0x18c/0x1e0 May 23 15:44:02 ttip kernel: [000000000043cee8] mdesc_update+0x128/0x1a0 May 23 15:44:02 ttip kernel: [00000000004530a0] md_update_data+0x20/0x60 May 23 15:44:02 ttip kernel: [0000000000452710] ds_thread+0x190/0x1e0 May 23 15:44:02 ttip kernel: [0000000000493d58] kthread+0x118/0x140 May 23 15:44:02 ttip kernel: [0000000000406084] ret_from_fork+0x1c/0x2c May 23 15:44:02 ttip kernel: ---[ end trace 567c1cafb6220925 ]--- May 23 15:44:02 ttip kernel: ------------[ cut here ]------------ May 23 15:44:02 ttip kernel: WARNING: CPU: 35 PID: 315 at lib/kobject.c:240 kobject_add_internal+0x2a4/0x3a0 May 23 15:44:02 ttip kernel: kobject_add_internal failed for vnet-port-0-2 with -EEXIST, don't try to register things with the same name in the same directory. May 23 15:44:02 ttip kernel: Modules linked in: overlay xfs tun camellia_sparc64 des_sparc64 des_generic aes_sparc64 md5_sparc64 sha512_sparc64 sha256_sparc64 sha1_sparc64 n2_rng rng_core flash nf_nat_pptp nf_nat_proto_gre nf_conntrack_pptp nf_conntrack_proto_gre nf_nat nf_conntrack ip_tables x_tables autofs4 ext4 crc16 jbd2 mbcache raid10 raid456 libcrc32c crc32c_generic async_raid6_recov async_memcpy async_pq raid6_pq async_xor xor async_tx raid1 raid0 multipath linear md_mod crc32c_sparc64 sunvnet sunvdc May 23 15:44:02 ttip kernel: CPU: 35 PID: 315 Comm: kldomd Tainted: G W 4.12.0-rc2-00049-gfde8e33d1068-dirty #316 May 23 15:44:02 ttip kernel: Call Trace: May 23 15:44:02 ttip kernel: [000000000046b194] __warn+0xb4/0xe0 May 23 15:44:02 ttip kernel: [000000000046b1f4] warn_slowpath_fmt+0x34/0x60 May 23 15:44:02 ttip kernel: [00000000007bb804] kobject_add_internal+0x2a4/0x3a0 May 23 15:44:02 ttip kernel: [00000000007bb97c] kobject_add+0x7c/0xa0 May 23 15:44:02 ttip kernel: [000000000088c2a0] device_add+0x100/0x620 May 23 15:44:02 ttip kernel: [000000000088c7d4] device_register+0x14/0x40 May 23 15:44:02 ttip kernel: [0000000000450b4c] vio_create_one+0x42c/0x540 May 23 15:44:02 ttip kernel: [0000000000450d1c] vio_add+0x1c/0x40 May 23 15:44:02 ttip kernel: [000000000043c04c] invoke_on_missing+0x18c/0x1e0 May 23 15:44:02 ttip kernel: [000000000043cee8] mdesc_update+0x128/0x1a0 May 23 15:44:02 ttip kernel: [00000000004530a0] md_update_data+0x20/0x60 May 23 15:44:02 ttip kernel: [0000000000452710] ds_thread+0x190/0x1e0 May 23 15:44:02 ttip kernel: [0000000000493d58] kthread+0x118/0x140 May 23 15:44:02 ttip kernel: [0000000000406084] ret_from_fork+0x1c/0x2c May 23 15:44:02 ttip kernel: [0000000000000000] (null) May 23 15:44:02 ttip kernel: ---[ end trace 567c1cafb6220926 ]--- May 23 15:44:02 ttip kernel: VIO: Could not register device vnet-port-0-2, err=-17 mator@ttip:~$ ls /sys/devices/channel-devices/ devspec modalias power type vdc-port-0-0 vdc-port-2-0 vlds-port-0-0 vnet-port-0-1 ds-0 obppath subsystem uevent vdc-port-1-0 vdc-port-3-0 vnet-port-0-0 vnet-port-0-2 looks like VIO does not remove sysfs devices, so kernel fails to add a new device, which is already exists in sysfs.
mator@ttip:~$ journalctl -f -k -- Logs begin at Wed 2016-11-30 10:59:53 MSK. -- May 23 15:44:02 ttip kernel: [0000000000450d1c] vio_add+0x1c/0x40 May 23 15:44:02 ttip kernel: [000000000043c04c] invoke_on_missing+0x18c/0x1e0 May 23 15:44:02 ttip kernel: [000000000043cee8] mdesc_update+0x128/0x1a0 May 23 15:44:02 ttip kernel: [00000000004530a0] md_update_data+0x20/0x60 May 23 15:44:02 ttip kernel: [0000000000452710] ds_thread+0x190/0x1e0 May 23 15:44:02 ttip kernel: [0000000000493d58] kthread+0x118/0x140 May 23 15:44:02 ttip kernel: [0000000000406084] ret_from_fork+0x1c/0x2c May 23 15:44:02 ttip kernel: [0000000000000000] (null) May 23 15:44:02 ttip kernel: ---[ end trace 567c1cafb6220926 ]--- May 23 15:44:02 ttip kernel: VIO: Could not register device vnet-port-0-2, err=-17 May 23 16:01:01 ttip kernel: ds-0: Machine description update. May 23 16:01:01 ttip kernel: VIO: Removing device vnet-port-0-2 ^C mator@ttip:~$ ls /sys/devices/channel-devices/ devspec modalias power type vdc-port-0-0 vdc-port-2-0 vlds-port-0-0 vnet-port-0-1 ds-0 obppath subsystem uevent vdc-port-1-0 vdc-port-3-0 vnet-port-0-0 mator@ttip:~$
Proposed patch at http://marc.info/?l=linux-sparc&m=149608549812344.
I believe it has been fixed, did not seen it for a long time already, currently running 4.15.0-rc6.