Bug 112541 - [sparc64] OOPS on machine description (md) update event
Summary: [sparc64] OOPS on machine description (md) update event
Status: RESOLVED CODE_FIX
Alias: None
Product: Platform Specific/Hardware
Classification: Unclassified
Component: SPARC64 (show other bugs)
Hardware: Sparc64 Linux
: P1 low
Assignee: platform_sparc64
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2016-02-16 18:34 UTC by Anatoly Pugachev
Modified: 2018-01-01 20:50 UTC (History)
2 users (show)

See Also:
Kernel Version: 4.12.0-rc2
Subsystem:
Regression: No
Bisected commit-id:


Attachments
boot log kernel warning , 29 feb (23.92 KB, text/plain)
2016-02-29 20:49 UTC, Anatoly Pugachev
Details

Description Anatoly Pugachev 2016-02-16 18:34:29 UTC
This is debian sparc64 sid/unstable LDOM running on T5-2 sparc machine. Trying to boot another LDOM, got this kernel OOPS (can't reproduce another time).


Feb 16 11:53:16 deb4g kernel: ds-0: Machine description update.
Feb 16 11:53:16 deb4g kernel: ------------[ cut here ]------------
Feb 16 11:53:16 deb4g kernel: WARNING: CPU: 13 PID: 179 at /build/linux-LRrlP2/linux-4.4/mm/page_alloc.c:2233 get_page_from_freelist+0x8a0/0x940()
Feb 16 11:53:16 deb4g kernel: Modules linked in: libcrc32c dm_mod tun camellia_sparc64 des_sparc64 des_generic aes_sparc64 md5_sparc64 sha512_sparc6
4 sha256_sparc64 sha1_sparc64 autofs4 ext4 crc16 mbcache jbd2 btrfs xor zlib_deflate raid6_pq sunvnet sunvdc crc32c_sparc64 [last unloaded: xfs]
Feb 16 11:53:16 deb4g kernel: CPU: 13 PID: 179 Comm: kldomd Not tainted 4.4.0-trunk-sparc64-smp #1 Debian 4.4-1~exp1
Feb 16 11:53:16 deb4g kernel: Call Trace:
Feb 16 11:53:16 deb4g kernel:  [0000000000466a50] warn_slowpath_common+0x70/0xc0
Feb 16 11:53:16 deb4g kernel:  [0000000000466b3c] warn_slowpath_null+0x1c/0x40
Feb 16 11:53:16 deb4g kernel:  [000000000055c2e0] get_page_from_freelist+0x8a0/0x940
Feb 16 11:53:16 deb4g kernel:  [000000000055c5f4] __alloc_pages_nodemask+0x114/0x9e0
Feb 16 11:53:16 deb4g kernel:  [00000000005a8c6c] cache_alloc_refill+0x34c/0x5a0
Feb 16 11:53:16 deb4g kernel:  [00000000005a9188] __kmalloc+0x148/0x180
Feb 16 11:53:16 deb4g kernel:  [000000000043be18] mdesc_kmalloc+0x18/0x60
Feb 16 11:53:16 deb4g kernel:  [000000000043d270] mdesc_update+0x30/0x1a0
Feb 16 11:53:16 deb4g kernel:  [00000000004526e0] md_update_data+0x20/0x60
Feb 16 11:53:16 deb4g kernel:  [0000000000452284] ds_thread+0x1a4/0x1e0
Feb 16 11:53:16 deb4g kernel:  [00000000004858ac] kthread+0xac/0xe0
Feb 16 11:53:16 deb4g kernel:  [00000000004060e4] ret_from_fork+0x1c/0x2c
Feb 16 11:53:16 deb4g kernel:  [0000000000000000]           (null)
Feb 16 11:53:16 deb4g kernel: ---[ end trace 3ceb1e838719c43c ]---
Feb 16 11:53:16 deb4g kernel: VIO: Adding device vnet-port-0-3
Feb 16 11:53:16 deb4g kernel: Kernel unaligned access at TPC[b6de1c] mdesc_memblock_free+0x0/0x74
Feb 16 11:53:16 deb4g kernel: sunvnet: eth0: PORT ( remote-mac 00:14:4f:fa:57:1c )
Feb 16 11:53:16 deb4g kernel: Unable to handle kernel NULL pointer dereference in mna handler
Feb 16 11:53:16 deb4g kernel:  at virtual address 000000000000002d
Feb 16 11:53:16 deb4g kernel: current->{active_,}mm->context = 0000000000001c28
Feb 16 11:53:16 deb4g kernel: current->{active_,}mm->pgd = fff800098d2de000
Feb 16 11:53:16 deb4g kernel:               \|/ ____ \|/
                                            "@'/ .. \`@"
                                            /_| \__/ |_\
                                               \__U_/
Feb 16 11:53:16 deb4g kernel: kldomd(179): Oops [#1]
Feb 16 11:53:16 deb4g kernel: CPU: 13 PID: 179 Comm: kldomd Tainted: G        W       4.4.0-trunk-sparc64-smp #1 Debian 4.4-1~exp1
Feb 16 11:53:16 deb4g kernel: task: fff800100063afe0 ti: fff8000fff288000 task.ti: fff8000fff288000
Feb 16 11:53:16 deb4g kernel: TSTATE: 0000004480e01605 TPC: 0000000000b6de1c TNPC: 0000000000b6de20 Y: 00000000    Tainted: G        W      
Feb 16 11:53:16 deb4g kernel: TPC: <mdesc_memblock_free+0x0/0x74>
Feb 16 11:53:16 deb4g kernel: g0: 0000000000a0b558 g1: 0000000000b6de1c g2: 0000000000000000 g3: 0000000000000000
Feb 16 11:53:16 deb4g kernel: g4: fff800100063afe0 g5: fff800102d900000 g6: fff8000fff288000 g7: 0000000000000001
Feb 16 11:53:16 deb4g kernel: o0: fff800102fc74000 o1: 0000000000ac9800 o2: 0000000000000001 o3: 0000000000450a00
Feb 16 11:53:16 deb4g kernel: o4: 0000000000a5f5d8 o5: 00000000000006d6 sp: fff8000fff28b301 ret_pc: 000000000043d348
Feb 16 11:53:16 deb4g kernel: RPC: <mdesc_update+0x108/0x1a0>
Feb 16 11:53:16 deb4g kernel: l0: fff8001001184840 l1: fff800102e4d2100 l2: fff8000ffaa96fc0 l3: 0000000000000400
Feb 16 11:53:16 deb4g kernel: l4: 0000000000000000 l5: 0000000000000000 l6: 0000000000000000 l7: 0000000000000008
Feb 16 11:53:16 deb4g kernel: i0: 0000000000000021 i1: 0000000000ac9800 i2: 0000000000bed800 i3: fff800102fc74000
Feb 16 11:53:16 deb4g kernel: i4: fff8000c11770000 i5: 0000000000000000 i6: fff8000fff28b3c1 i7: 00000000004526e0
Feb 16 11:53:16 deb4g kernel: I7: <md_update_data+0x20/0x60>
Feb 16 11:53:16 deb4g kernel: Call Trace:
Feb 16 11:53:16 deb4g kernel:  [00000000004526e0] md_update_data+0x20/0x60
Feb 16 11:53:16 deb4g kernel:  [0000000000452284] ds_thread+0x1a4/0x1e0
Feb 16 11:53:16 deb4g kernel:  [00000000004858ac] kthread+0xac/0xe0
Feb 16 11:53:16 deb4g kernel:  [00000000004060e4] ret_from_fork+0x1c/0x2c
Feb 16 11:53:16 deb4g kernel:  [0000000000000000]           (null)
Feb 16 11:53:16 deb4g kernel: Disabling lock debugging due to kernel taint
Feb 16 11:53:16 deb4g kernel: Caller[00000000004526e0]: md_update_data+0x20/0x60
Feb 16 11:53:16 deb4g kernel: Caller[0000000000452284]: ds_thread+0x1a4/0x1e0
Feb 16 11:53:16 deb4g kernel: Caller[00000000004858ac]: kthread+0xac/0xe0
Feb 16 11:53:16 deb4g kernel: Caller[00000000004060e4]: ret_from_fork+0x1c/0x2c
Feb 16 11:53:16 deb4g kernel: Caller[0000000000000000]:           (null)
Feb 16 11:53:16 deb4g kernel: Instruction DUMP: c44e4000  106ffcb4  c217a7bf <f206200c> 82102001  f4062010  90100018  ba1f6001  c226200c
Comment 1 Anatoly Pugachev 2016-02-29 10:29:04 UTC
once again, binding another domain (not even starting it), causes linux kernel to OOPS:

Feb 29 13:24:30 deb4g kernel: ds-0: Machine description update.
Feb 29 13:24:30 deb4g kernel: ------------[ cut here ]------------
Feb 29 13:24:30 deb4g kernel: WARNING: CPU: 13 PID: 179 at /build/linux-cs59zJ/linux-4.4.1/mm/page_alloc.c:2233 get_page_from_freelist+0x8a0/0x940()
Feb 29 13:24:30 deb4g kernel: Modules linked in: n2_rng tun dm_mod camellia_sparc64 des_sparc64 des_generic aes_sparc64 md5_sparc64 sha512_sparc64 sha256_sparc64 sha1_sparc64 rng_core autofs4 ext4 crc16 mbcache jbd2 btrfs xor zlib_deflate raid6_pq sunvnet sunvdc crc32c_sparc64 [last unloaded: n2_rng]
Feb 29 13:24:30 deb4g kernel: CPU: 13 PID: 179 Comm: kldomd Not tainted 4.4.0-trunk-sparc64-smp #1 Debian 4.4.1-1~exp1
Feb 29 13:24:30 deb4g kernel: Call Trace:
Feb 29 13:24:30 deb4g kernel:  [0000000000466a70] warn_slowpath_common+0x70/0xc0
Feb 29 13:24:30 deb4g kernel:  [0000000000466b5c] warn_slowpath_null+0x1c/0x40
Feb 29 13:24:30 deb4g kernel:  [000000000055c880] get_page_from_freelist+0x8a0/0x940
Feb 29 13:24:30 deb4g kernel:  [000000000055cb94] __alloc_pages_nodemask+0x114/0x9e0
Feb 29 13:24:30 deb4g kernel:  [00000000005a920c] cache_alloc_refill+0x34c/0x5a0
Feb 29 13:24:30 deb4g kernel:  [00000000005a9728] __kmalloc+0x148/0x180
Feb 29 13:24:30 deb4g kernel:  [000000000043be18] mdesc_kmalloc+0x18/0x60
Feb 29 13:24:30 deb4g kernel:  [000000000043d270] mdesc_update+0x30/0x1a0
Feb 29 13:24:30 deb4g kernel:  [00000000004526e0] md_update_data+0x20/0x60
Feb 29 13:24:30 deb4g kernel:  [0000000000452284] ds_thread+0x1a4/0x1e0
Feb 29 13:24:30 deb4g kernel:  [00000000004858cc] kthread+0xac/0xe0
Feb 29 13:24:30 deb4g kernel:  [00000000004060e4] ret_from_fork+0x1c/0x2c
Feb 29 13:24:30 deb4g kernel:  [0000000000000000]           (null)
Feb 29 13:24:30 deb4g kernel: ---[ end trace 72e6e2f617d5e977 ]---
Feb 29 13:24:30 deb4g kernel: VIO: Adding device vnet-port-0-3
Feb 29 13:24:30 deb4g kernel: sunvnet: eth0: PORT ( remote-mac 00:14:4f:f8:38:39 )
Feb 29 13:24:30 deb4g kernel:               \|/ ____ \|/
                                            "@'/ .. \`@"
                                            /_| \__/ |_\
                                               \__U_/
											   Feb 29 13:24:30 deb4g kernel: kldomd(179): Kernel illegal instruction [#1]
Feb 29 13:24:30 deb4g kernel: CPU: 13 PID: 179 Comm: kldomd Tainted: G        W       4.4.0-trunk-sparc64-smp #1 Debian 4.4.1-1~exp1
Feb 29 13:24:30 deb4g kernel: task: fff8001000638fe0 ti: fff8000fff2a4000 task.ti: fff8000fff2a4000
Feb 29 13:24:30 deb4g kernel: TSTATE: 0000004480e01605 TPC: 0000000000b71e1c TNPC: 0000000000b71e20 Y: 00000000    Tainted: G        W      
Feb 29 13:24:30 deb4g kernel: TPC: <mdesc_memblock_free+0x0/0x74>
Feb 29 13:24:30 deb4g kernel: g0: 0000000000a0d8b0 g1: 0000000000b71e1c g2: 0000000000000000 g3: 0000000000000000
Feb 29 13:24:30 deb4g kernel: g4: fff8001000638fe0 g5: fff800102d8fc000 g6: fff8000fff2a4000 g7: 0000000000000001
Feb 29 13:24:30 deb4g kernel: o0: fff800102fc74000 o1: 0000000000acd800 o2: 0000000000000001 o3: 0000000000450a00
Feb 29 13:24:30 deb4g kernel: o4: 0000000000a61de0 o5: 00000000000006d6 sp: fff8000fff2a7301 ret_pc: 000000000043d348
Feb 29 13:24:30 deb4g kernel: RPC: <mdesc_update+0x108/0x1a0>
Feb 29 13:24:30 deb4g kernel: l0: fff8001001184840 l1: fff800102e4d2100 l2: fff8000ffa89b760 l3: 0000000000000400
Feb 29 13:24:30 deb4g kernel: l4: 0000000000000000 l5: 0000000000000000 l6: 0000000000000000 l7: 0000000000000008
Feb 29 13:24:30 deb4g kernel: i0: 0000000000000021 i1: 0000000000acd800 i2: 0000000000bf1800 i3: fff800102fc74000
Feb 29 13:24:30 deb4g kernel: i4: fff8000ffd1c0000 i5: 0000000000000000 i6: fff8000fff2a73c1 i7: 00000000004526e0
Feb 29 13:24:30 deb4g kernel: I7: <md_update_data+0x20/0x60>
Feb 29 13:24:30 deb4g kernel: Call Trace:
Feb 29 13:24:30 deb4g kernel:  [00000000004526e0] md_update_data+0x20/0x60
Feb 29 13:24:30 deb4g kernel:  [0000000000452284] ds_thread+0x1a4/0x1e0
Feb 29 13:24:30 deb4g kernel:  [00000000004858cc] kthread+0xac/0xe0
Feb 29 13:24:30 deb4g kernel:  [00000000004060e4] ret_from_fork+0x1c/0x2c
Feb 29 13:24:30 deb4g kernel:  [0000000000000000]           (null)
Feb 29 13:24:30 deb4g kernel: Disabling lock debugging due to kernel taint
Feb 29 13:24:30 deb4g kernel: Caller[00000000004526e0]: md_update_data+0x20/0x60
Feb 29 13:24:30 deb4g kernel: Caller[0000000000452284]: ds_thread+0x1a4/0x1e0
Feb 29 13:24:30 deb4g kernel: Caller[00000000004858cc]: kthread+0xac/0xe0
Feb 29 13:24:30 deb4g kernel: Caller[00000000004060e4]: ret_from_fork+0x1c/0x2c
Feb 29 13:24:30 deb4g kernel: Caller[0000000000000000]:           (null)
Feb 29 13:24:30 deb4g kernel: Instruction DUMP: 00000000  00000000  00000000 <00000000> 00000000  00000000  00000000  00000000  00000000
Comment 2 Anatoly Pugachev 2016-02-29 10:35:56 UTC
just for information:

control domain is stock (non patched) solaris 11.3 with ldm manager:

sysadmin@deimos:~$  pkg search '/usr/sbin/ldm'
INDEX      ACTION VALUE        PACKAGE
path       file   usr/sbin/ldm pkg:/system/ldoms/ldomsmanager@3.3.0.0.17-0.175.3.0.0.28.0
sysadmin@deimos:~$ ldm -V

Logical Domains Manager (v 3.3.0.0.17)
        Hypervisor control protocol v 1.12
        Using Hypervisor MD v 1.4

System PROM:
        Hostconfig      v. 1.6.1.a      @(#)Hostconfig 1.6.1.a 2015/09/09 13:15
        Hypervisor      v. 1.15.1.a     @(#)Hypervisor 1.15.1.a 2015/09/09 12:51 
        OpenBoot        v. 4.38.1       @(#)OpenBoot 4.38.1 2015/08/21 14:26
Comment 3 Anatoly Pugachev 2016-02-29 20:47:32 UTC
got updated T5-2 firmware package, now hardware is in the following configuration:

sysadmin@deimos:~$ ldm -V

Logical Domains Manager (v 3.3.0.0.17)
        Hypervisor control protocol v 1.12
        Using Hypervisor MD v 1.4

System PROM:
        Hostconfig      v. 1.6.3        @(#)Hostconfig 1.6.3 2015/11/25 08:57
        Hypervisor      v. 1.15.3       @(#)Hypervisor 1.15.3 2015/11/11 17:15 
        OpenBoot        v. 4.38.3       @(#)OpenBoot 4.38.3 2015/11/11 10:38


firmware update requires hard server reboot (poweroff / poweron sequence), so booting server (parallel startup of multiple LDOMs), got the following kernel warning in one of the LDOMs (debian linux sparc64):

Feb 29 23:04:08 deb4g kernel: Supported PMU type is 'niagara5'
Feb 29 23:04:08 deb4g kernel: ldc.c:v1.1 (July 22, 2008)
Feb 29 23:04:08 deb4g kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns
Feb 29 23:04:08 deb4g kernel: NET: Registered protocol family 16
Feb 29 23:04:08 deb4g kernel: VIO: Adding device channel-devices
Feb 29 23:04:08 deb4g kernel: VIO: Adding device vnet-port-0-0
Feb 29 23:04:08 deb4g kernel: VIO: Adding device vnet-port-0-1
Feb 29 23:04:08 deb4g kernel: VIO: Adding device vnet-port-0-2
Feb 29 23:04:08 deb4g kernel: VIO: Adding device vnet-port-0-3
Feb 29 23:04:08 deb4g kernel: VIO: Adding device vdc-port-2-0
Feb 29 23:04:08 deb4g kernel: VIO: Adding device vdc-port-1-0
Feb 29 23:04:08 deb4g kernel: VIO: Adding device vdc-port-3-0
Feb 29 23:04:08 deb4g kernel: VIO: Adding device vdc-port-4-0
Feb 29 23:04:08 deb4g kernel: VIO: Adding device vdc-port-0-0
Feb 29 23:04:08 deb4g kernel: VIO: Adding device vlds-port-0-0
Feb 29 23:04:08 deb4g kernel: VIO: Adding device ds-0
Feb 29 23:04:08 deb4g kernel: vgaarb: loaded
Feb 29 23:04:08 deb4g kernel: SUN4V: Reboot data supported (maj=1,min=0).
Feb 29 23:04:08 deb4g kernel: ds.c:v1.0 (Jul 11, 2007)
Feb 29 23:04:08 deb4g kernel: ds-0: ds_conn_reset() from send_events
Feb 29 23:04:08 deb4g kernel: clocksource: Switched to clocksource stick
Feb 29 23:04:08 deb4g kernel: ds-0: Registered md-update service.
Feb 29 23:04:08 deb4g kernel: ds-0: Registered domain-shutdown service.
Feb 29 23:04:08 deb4g kernel: ds-0: Registered domain-panic service.
Feb 29 23:04:08 deb4g kernel: ds-0: Registered dr-cpu service.
Feb 29 23:04:08 deb4g kernel: ds-0: Registered pri service.
Feb 29 23:04:08 deb4g kernel: ds-0: Registered var-config service.
Feb 29 23:04:08 deb4g kernel: ds-0: Machine description update.
Feb 29 23:04:08 deb4g kernel: ------------[ cut here ]------------
Feb 29 23:04:08 deb4g kernel: WARNING: CPU: 29 PID: 179 at /build/linux-cs59zJ/linux-4.4.1/mm/page_alloc.c:2233 get_page_from_freelist+0x8a0/0x940()
Feb 29 23:04:08 deb4g kernel: Modules linked in:
Feb 29 23:04:08 deb4g kernel: CPU: 29 PID: 179 Comm: kldomd Not tainted 4.4.0-trunk-sparc64-smp #1 Debian 4.4.1-1~exp1
Feb 29 23:04:08 deb4g kernel: Call Trace:
Feb 29 23:04:08 deb4g kernel:  [0000000000466a70] warn_slowpath_common+0x70/0xc0
Feb 29 23:04:08 deb4g kernel:  [0000000000466b5c] warn_slowpath_null+0x1c/0x40
Feb 29 23:04:08 deb4g kernel:  [000000000055c880] get_page_from_freelist+0x8a0/0x940
Feb 29 23:04:08 deb4g kernel:  [000000000055cb94] __alloc_pages_nodemask+0x114/0x9e0
Feb 29 23:04:08 deb4g kernel:  [00000000005a920c] cache_alloc_refill+0x34c/0x5a0
Feb 29 23:04:08 deb4g kernel:  [00000000005a9728] __kmalloc+0x148/0x180
Feb 29 23:04:08 deb4g kernel:  [000000000043be18] mdesc_kmalloc+0x18/0x60
Feb 29 23:04:08 deb4g kernel:  [000000000043d270] mdesc_update+0x30/0x1a0
Feb 29 23:04:08 deb4g kernel:  [00000000004526e0] md_update_data+0x20/0x60
Feb 29 23:04:08 deb4g kernel:  [0000000000452284] ds_thread+0x1a4/0x1e0
Feb 29 23:04:08 deb4g kernel:  [00000000004858cc] kthread+0xac/0xe0
Feb 29 23:04:08 deb4g kernel:  [00000000004060e4] ret_from_fork+0x1c/0x2c
Feb 29 23:04:08 deb4g kernel:  [0000000000000000]           (null)
Feb 29 23:04:08 deb4g kernel: ---[ end trace 4e5f6ed02de69a82 ]---
Feb 29 23:04:08 deb4g kernel: NET: Registered protocol family 2
Feb 29 23:04:08 deb4g kernel: TCP established hash table entries: 524288 (order: 9, 4194304 bytes)
Feb 29 23:04:08 deb4g kernel: TCP bind hash table entries: 65536 (order: 7, 1048576 bytes)
Feb 29 23:04:08 deb4g kernel: TCP: Hash tables configured (established 524288 bind 65536)
Feb 29 23:04:08 deb4g kernel: UDP hash table entries: 32768 (order: 7, 1048576 bytes)
Feb 29 23:04:08 deb4g kernel: UDP-Lite hash table entries: 32768 (order: 7, 1048576 bytes)
Feb 29 23:04:08 deb4g kernel: NET: Registered protocol family 1
Feb 29 23:04:08 deb4g kernel: PCI: CLS 0 bytes, default 64
Feb 29 23:04:08 deb4g kernel: Unpacking initramfs...
Feb 29 23:04:08 deb4g kernel: Freeing initrd memory: 17376K (fff8000074000000 - fff80000750f8000)

Next two test reboots of this LDOM, does not show any kernel OOPS.
So it seems kernel complains only when receive/happens machine description (MD) update event.

PS: attached full "journalctl -b" output from boot.
Comment 4 Anatoly Pugachev 2016-02-29 20:49:47 UTC
Created attachment 206481 [details]
boot log kernel warning , 29 feb
Comment 5 Anatoly Pugachev 2016-04-01 15:43:24 UTC
still valid for kernel 4.5 :

Apr 01 18:26:37 landau.east.ru kernel: ds-0: Machine description update.
Apr 01 18:26:37 landau.east.ru kernel: ------------[ cut here ]------------
Apr 01 18:26:37 landau.east.ru kernel: WARNING: CPU: 41 PID: 658 at /build/linux-XaLpSN/linux-4.5/mm/page_alloc.c:2252 get_page_from_freelist+0x894/
Apr 01 18:26:37 landau.east.ru kernel: Modules linked in: tun xt_tcpudp xt_multiport xt_conntrack iptable_filter iptable_nat nf_conntrack_ipv4 nf_de
Apr 01 18:26:37 landau.east.ru kernel: CPU: 41 PID: 658 Comm: kldomd Not tainted 4.5.0-trunk-sparc64-smp #1 Debian 4.5-1~exp1
Apr 01 18:26:37 landau.east.ru kernel: Call Trace:
Apr 01 18:26:37 landau.east.ru kernel:  [0000000000466990] warn_slowpath_common+0x70/0xc0
Apr 01 18:26:37 landau.east.ru kernel:  [0000000000466a7c] warn_slowpath_null+0x1c/0x40
Apr 01 18:26:37 landau.east.ru kernel:  [00000000005626b4] get_page_from_freelist+0x894/0x940
Apr 01 18:26:37 landau.east.ru kernel:  [00000000005629d0] __alloc_pages_nodemask+0x110/0xae0
Apr 01 18:26:37 landau.east.ru kernel:  [00000000005b55d8] cache_alloc_refill+0x358/0x620
Apr 01 18:26:37 landau.east.ru kernel:  [00000000005b60f4] __kmalloc+0x1f4/0x220
Apr 01 18:26:37 landau.east.ru kernel:  [000000000043bbf8] mdesc_kmalloc+0x18/0x60
Apr 01 18:26:37 landau.east.ru kernel:  [000000000043d070] mdesc_update+0x30/0x1a0
Apr 01 18:26:37 landau.east.ru kernel:  [0000000000452a20] md_update_data+0x20/0x60
Apr 01 18:26:37 landau.east.ru kernel:  [0000000000451fc8] ds_thread+0x1a8/0x1e0
Apr 01 18:26:37 landau.east.ru kernel:  [0000000000485f8c] kthread+0xac/0xe0
Apr 01 18:26:37 landau.east.ru kernel:  [00000000004060e4] ret_from_fork+0x1c/0x2c
Apr 01 18:26:37 landau.east.ru kernel:  [0000000000000000]           (null)
Apr 01 18:26:37 landau.east.ru kernel: ---[ end trace ba8e0300a1562a90 ]---
Apr 01 18:26:37 landau.east.ru kernel: VIO: Adding device vnet-port-0-4
Apr 01 18:26:37 landau.east.ru kernel: sunvnet: eth0: PORT ( remote-mac 00:14:4f:f8:68:82 )
Apr 01 18:26:37 landau.east.ru kernel: OOPS: Bogus kernel PC [fffffffff162cce4] in fault handler
Apr 01 18:26:37 landau.east.ru kernel: OOPS: RPC [0000000000b9be34]
Apr 01 18:26:37 landau.east.ru kernel: OOPS: RPC <mdesc_memblock_free+0x4/0x74>
Apr 01 18:26:37 landau.east.ru kernel: OOPS: Fault was to vaddr[fffffffff162cce4]
Apr 01 18:26:37 landau.east.ru kernel: CPU: 41 PID: 658 Comm: kldomd Tainted: G        W       4.5.0-trunk-sparc64-smp #1 Debian 4.5-1~exp1
Apr 01 18:26:37 landau.east.ru kernel: Call Trace:
Apr 01 18:26:37 landau.east.ru kernel:  [0000000000962338] do_sparc64_fault+0x178/0x9c0
Apr 01 18:26:37 landau.east.ru kernel:  [0000000000407c90] sparc64_realfault_common+0x10/0x20
Apr 01 18:26:37 landau.east.ru kernel:  [fffffffff162cce4] 0xfffffffff162cce4
Apr 01 18:26:37 landau.east.ru kernel:  [0000000000452a20] md_update_data+0x20/0x60
Apr 01 18:26:37 landau.east.ru kernel:  [0000000000451fc8] ds_thread+0x1a8/0x1e0
Apr 01 18:26:37 landau.east.ru kernel:  [0000000000485f8c] kthread+0xac/0xe0
Apr 01 18:26:37 landau.east.ru kernel:  [00000000004060e4] ret_from_fork+0x1c/0x2c
Apr 01 18:26:37 landau.east.ru kernel:  [0000000000000000]           (null)
Apr 01 18:26:37 landau.east.ru kernel: Unable to handle kernel paging request at virtual address fffffffff162cce4
Apr 01 18:26:37 landau.east.ru kernel: tsk->{mm,active_mm}->context = 000000000000058d
Apr 01 18:26:37 landau.east.ru kernel: tsk->{mm,active_mm}->pgd = fff800201fd1e000
Apr 01 18:26:37 landau.east.ru kernel:               \|/ ____ \|/
                                                     "@'/ .. \`@"
                                                     /_| \__/ |_\
                                                        \__U_/
Apr 01 18:26:37 landau.east.ru kernel: kldomd(658): Oops [#1]
Apr 01 18:26:37 landau.east.ru kernel: CPU: 41 PID: 658 Comm: kldomd Tainted: G        W       4.5.0-trunk-sparc64-smp #1 Debian 4.5-1~exp1
Apr 01 18:26:37 landau.east.ru kernel: task: fff8002023fecc60 ti: fff8002023024000 task.ti: fff8002023024000
Apr 01 18:26:37 landau.east.ru kernel: TSTATE: 0000004480e01605 TPC: fffffffff162cce4 TNPC: 0000000028a9623c Y: 00000000    Tainted: G        W     
Apr 01 18:26:37 landau.east.ru kernel: TPC: <0xfffffffff162cce4>
Apr 01 18:26:37 landau.east.ru kernel: g0: 0000000000a33268 g1: 0000000000b9be30 g2: 0000000000000000 g3: 0000000000000000
Apr 01 18:26:37 landau.east.ru kernel: g4: fff8002023fecc60 g5: fff800207da92000 g6: fff8002023024000 g7: 0000000000000001
Apr 01 18:26:37 landau.east.ru kernel: o0: fff800207fec4000 o1: 0000000000af6000 o2: 0000000000000001 o3: 00000000004506c0
Apr 01 18:26:37 landau.east.ru kernel: o4: 0000000000a881d0 o5: 00000000000016b9 sp: fff8002023027301 ret_pc: 0000000000b9be34
Apr 01 18:26:37 landau.east.ru kernel: RPC: <mdesc_memblock_free+0x4/0x74>
Apr 01 18:26:37 landau.east.ru kernel: l0: fff800202628aa40 l1: fff800207e692100 l2: fff800200e0ae020 l3: 0000000000004000
Apr 01 18:26:37 landau.east.ru kernel: l4: 0000000000000000 l5: 0000000000000000 l6: 0000000000000000 l7: 0000000000000008
Apr 01 18:26:37 landau.east.ru kernel: i0: 0000000000000021 i1: 0000000000af6000 i2: 0000000000c1b800 i3: fff800207fec4000
Apr 01 18:26:37 landau.east.ru kernel: i4: fff8001f9ac20000 i5: 0000000000000000 i6: fff80020230273c1 i7: 0000000000452a20
Apr 01 18:26:37 landau.east.ru kernel: I7: <md_update_data+0x20/0x60>
Apr 01 18:26:37 landau.east.ru kernel: Call Trace:
Apr 01 18:26:37 landau.east.ru kernel:  [0000000000452a20] md_update_data+0x20/0x60
Apr 01 18:26:37 landau.east.ru kernel:  [0000000000451fc8] ds_thread+0x1a8/0x1e0
Apr 01 18:26:37 landau.east.ru kernel:  [0000000000485f8c] kthread+0xac/0xe0
Apr 01 18:26:37 landau.east.ru kernel:  [00000000004060e4] ret_from_fork+0x1c/0x2c
Apr 01 18:26:37 landau.east.ru kernel:  [0000000000000000]           (null)
Apr 01 18:26:37 landau.east.ru kernel: Disabling lock debugging due to kernel taint
Apr 01 18:26:37 landau.east.ru kernel: Caller[0000000000452a20]: md_update_data+0x20/0x60
Apr 01 18:26:37 landau.east.ru kernel: Caller[0000000000451fc8]: ds_thread+0x1a8/0x1e0
Apr 01 18:26:37 landau.east.ru kernel: Caller[0000000000485f8c]: kthread+0xac/0xe0
Apr 01 18:26:37 landau.east.ru kernel: Caller[00000000004060e4]: ret_from_fork+0x1c/0x2c
Apr 01 18:26:37 landau.east.ru kernel: Caller[0000000000000000]:           (null)
Apr 01 18:26:37 landau.east.ru kernel: Instruction DUMP:
Apr 01 18:26:37 landau.east.ru kernel: Unable to handle kernel paging request at virtual address fffffffff162c000
Apr 01 18:26:37 landau.east.ru kernel: tsk->{mm,active_mm}->context = 000000000000058d
Apr 01 18:26:37 landau.east.ru kernel: tsk->{mm,active_mm}->pgd = fff800201fd1e000
Apr 01 18:26:37 landau.east.ru kernel:               \|/ ____ \|/
                                                     "@'/ .. \`@"
                                                     /_| \__/ |_\
                                                        \__U_/
Apr 01 18:26:37 landau.east.ru kernel: kldomd(658): Oops [#2]
Apr 01 18:26:37 landau.east.ru kernel: CPU: 41 PID: 658 Comm: kldomd Tainted: G      D W       4.5.0-trunk-sparc64-smp #1 Debian 4.5-1~exp1
Apr 01 18:26:37 landau.east.ru kernel: task: fff8002023fecc60 ti: fff8002023024000 task.ti: fff8002023024000
Apr 01 18:26:37 landau.east.ru kernel: TSTATE: 0000008880e01601 TPC: 000000000042896c TNPC: 0000000000428970 Y: 00001957    Tainted: G      D W     
Apr 01 18:26:37 landau.east.ru kernel: TPC: <die_if_kernel+0x28c/0x320>
Apr 01 18:26:37 landau.east.ru kernel: g0: 000000000000000e g1: 0000000000a2ec00 g2: 0000000000b08250 g3: 0000000000000001
Apr 01 18:26:37 landau.east.ru kernel: g4: fff8002023fecc60 g5: fff800207da92000 g6: fff8002023024000 g7: 0000000000000029
Apr 01 18:26:37 landau.east.ru kernel: o0: 0000000000000011 o1: 0000000000000000 o2: 0000000000000000 o3: 0000000000000020
Apr 01 18:26:37 landau.east.ru kernel: o4: fffffffff162cce4 o5: 0000004480e01605 sp: fff8002023026f41 ret_pc: 0000000000428950
Apr 01 18:26:37 landau.east.ru kernel: RPC: <die_if_kernel+0x270/0x320>
Apr 01 18:26:37 landau.east.ru kernel: l0: fff8002023024b80 l1: 0000000000c16800 l2: 0000000000c16000 l3: fff8002023027f40
Apr 01 18:26:37 landau.east.ru kernel: l4: 0000000000000000 l5: 0000000000000008 l6: 0000000000ae6800 l7: 0000000000ae7800
Apr 01 18:26:37 landau.east.ru kernel: i0: fff8002023024000 i1: fff8002023027a60 i2: fffffffff162ccd8 i3: fffffffffffffffe
Apr 01 18:26:37 landau.east.ru kernel: i4: 0000000000a2ef38 i5: fffffffff162cce4 i6: fff8002023027021 i7: 00000000009621a0
Apr 01 18:26:37 landau.east.ru kernel: I7: <unhandled_fault+0x8c/0xac>
Apr 01 18:26:37 landau.east.ru kernel: Call Trace:
Apr 01 18:26:37 landau.east.ru kernel:  [00000000009621a0] unhandled_fault+0x8c/0xac
Apr 01 18:26:37 landau.east.ru kernel:  [0000000000962348] do_sparc64_fault+0x188/0x9c0
Apr 01 18:26:37 landau.east.ru kernel:  [0000000000407c90] sparc64_realfault_common+0x10/0x20
Apr 01 18:26:37 landau.east.ru kernel:  [fffffffff162cce4] 0xfffffffff162cce4
Apr 01 18:26:37 landau.east.ru kernel:  [0000000000452a20] md_update_data+0x20/0x60
Apr 01 18:26:37 landau.east.ru kernel:  [0000000000451fc8] ds_thread+0x1a8/0x1e0
Apr 01 18:26:37 landau.east.ru kernel:  [0000000000485f8c] kthread+0xac/0xe0
Apr 01 18:26:37 landau.east.ru kernel:  [00000000004060e4] ret_from_fork+0x1c/0x2c
Apr 01 18:26:37 landau.east.ru kernel:  [0000000000000000]           (null)
Apr 01 18:26:37 landau.east.ru kernel: Caller[00000000009621a0]: unhandled_fault+0x8c/0xac
Apr 01 18:26:37 landau.east.ru kernel: Caller[0000000000962348]: do_sparc64_fault+0x188/0x9c0
Apr 01 18:26:37 landau.east.ru kernel: Caller[0000000000407c90]: sparc64_realfault_common+0x10/0x20
Apr 01 18:26:37 landau.east.ru kernel: Caller[0000000000b9be34]: mdesc_memblock_free+0x4/0x74
Apr 01 18:26:37 landau.east.ru kernel: Caller[0000000000452a20]: md_update_data+0x20/0x60
Apr 01 18:26:37 landau.east.ru kernel: Caller[0000000000451fc8]: ds_thread+0x1a8/0x1e0
Apr 01 18:26:37 landau.east.ru kernel: Caller[0000000000485f8c]: kthread+0xac/0xe0
Apr 01 18:26:37 landau.east.ru kernel: Caller[00000000004060e4]: ret_from_fork+0x1c/0x2c
Apr 01 18:26:37 landau.east.ru kernel: Caller[0000000000000000]:           (null)
Apr 01 18:26:37 landau.east.ru kernel: Instruction DUMP: 80a6e001  02400016  96102020 <d4068000> 92102020  4004bc87  9010001c  80a6e006  0247ffec
Comment 6 Anatoly Pugachev 2016-05-04 08:03:28 UTC
May 04 10:57:06 deb4g kernel: ds-0: Machine description update.
May 04 10:57:06 deb4g kernel: ------------[ cut here ]------------
May 04 10:57:06 deb4g kernel: WARNING: CPU: 30 PID: 178 at /build/linux-niWLGx/linux-4.5.2/mm/page_alloc.c:2272 get_page_from_freelist+0x894/0x940()
May 04 10:57:06 deb4g kernel: Modules linked in: tun(E) camellia_sparc64(E) des_sparc64(E) des_generic(E) md5_sparc64(E) sha512_sparc64(E) sha256_sp
May 04 10:57:06 deb4g kernel: CPU: 30 PID: 178 Comm: kldomd Tainted: G            E   4.5.0-2-sparc64-smp #1 Debian 4.5.2-1
May 04 10:57:06 deb4g kernel: Call Trace:
May 04 10:57:06 deb4g kernel:  [00000000004669d0] warn_slowpath_common+0x70/0xc0
May 04 10:57:06 deb4g kernel:  [0000000000466abc] warn_slowpath_null+0x1c/0x40
May 04 10:57:06 deb4g kernel:  [0000000000562574] get_page_from_freelist+0x894/0x940
May 04 10:57:06 deb4g kernel:  [0000000000562890] __alloc_pages_nodemask+0x110/0xae0
May 04 10:57:06 deb4g kernel:  [00000000005b5278] cache_alloc_refill+0x358/0x620
May 04 10:57:06 deb4g kernel:  [00000000005b5d94] __kmalloc+0x1f4/0x220
May 04 10:57:06 deb4g kernel:  [000000000043bbd8] mdesc_kmalloc+0x18/0x60
May 04 10:57:06 deb4g kernel:  [000000000043d050] mdesc_update+0x30/0x1a0
May 04 10:57:06 deb4g kernel:  [0000000000452a60] md_update_data+0x20/0x60
May 04 10:57:06 deb4g kernel:  [0000000000452008] ds_thread+0x1a8/0x1e0
May 04 10:57:06 deb4g kernel:  [0000000000485fcc] kthread+0xac/0xe0
May 04 10:57:06 deb4g kernel:  [00000000004060e4] ret_from_fork+0x1c/0x2c
May 04 10:57:06 deb4g kernel:  [0000000000000000]           (null)
May 04 10:57:06 deb4g kernel: ---[ end trace 1d473d9e3fa72407 ]---
May 04 10:57:06 deb4g kernel: VIO: Removing device vnet-port-0-5
May 04 10:57:06 deb4g kernel:               \|/ ____ \|/
                                            "@'/ .. \`@"
                                            /_| \__/ |_\
                                               \__U_/
May 04 10:57:06 deb4g kernel: kldomd(178): Kernel illegal instruction [#1]
May 04 10:57:06 deb4g kernel: CPU: 30 PID: 178 Comm: kldomd Tainted: G        W   E   4.5.0-2-sparc64-smp #1 Debian 4.5.2-1
May 04 10:57:06 deb4g kernel: task: fff8000fff4449e0 ti: fff8000fff47c000 task.ti: fff8000fff47c000
May 04 10:57:06 deb4g kernel: TSTATE: 0000004480e01605 TPC: 0000000000ba9e30 TNPC: 0000000000ba9e34 Y: 0000299c    Tainted: G        W   E  
May 04 10:57:06 deb4g kernel: TPC: <mdesc_memblock_free+0x0/0x74>
May 04 10:57:06 deb4g kernel: g0: 0000000000a3d1c0 g1: 0000000000ba9e30 g2: 0000000000000000 g3: 0000000000000000
May 04 10:57:06 deb4g kernel: g4: fff8000fff4449e0 g5: fff800102d9d2000 g6: fff8000fff47c000 g7: 0000000000000001
May 04 10:57:06 deb4g kernel: o0: fff800102ff12000 o1: 0000000000b02000 o2: 0000000000000001 o3: 0000000000450700
May 04 10:57:06 deb4g kernel: o4: 0000000000a93df0 o5: 00000000000006dc sp: fff8000fff47f301 ret_pc: 000000000043d12c
May 04 10:57:06 deb4g kernel: RPC: <mdesc_update+0x10c/0x1a0>
May 04 10:57:06 deb4g kernel: l0: fff8001001429140 l1: 0000000000c10100 l2: fff8000ff9b5fb40 l3: 0000000000004000
May 04 10:57:06 deb4g kernel: l4: 0000000000000000 l5: 0000000000000000 l6: 0000000000000000 l7: 0000000000000008
May 04 10:57:06 deb4g kernel: i0: 0000000000000021 i1: 0000000000b02000 i2: 0000000000c2b800 i3: fff800102ff12000
May 04 10:57:06 deb4g kernel: i4: fff8000ffc740000 i5: 0000000000000000 i6: fff8000fff47f3c1 i7: 0000000000452a60
May 04 10:57:06 deb4g kernel: I7: <md_update_data+0x20/0x60>
May 04 10:57:06 deb4g kernel: Call Trace:
May 04 10:57:06 deb4g kernel:  [0000000000452a60] md_update_data+0x20/0x60
May 04 10:57:06 deb4g kernel:  [0000000000452008] ds_thread+0x1a8/0x1e0
May 04 10:57:06 deb4g kernel:  [0000000000485fcc] kthread+0xac/0xe0
May 04 10:57:06 deb4g kernel:  [00000000004060e4] ret_from_fork+0x1c/0x2c
May 04 10:57:06 deb4g kernel:  [0000000000000000]           (null)
May 04 10:57:06 deb4g kernel: Disabling lock debugging due to kernel taint
May 04 10:57:06 deb4g kernel: Caller[0000000000452a60]: md_update_data+0x20/0x60
May 04 10:57:06 deb4g kernel: Caller[0000000000452008]: ds_thread+0x1a8/0x1e0
May 04 10:57:06 deb4g kernel: Caller[0000000000485fcc]: kthread+0xac/0xe0
May 04 10:57:06 deb4g kernel: Caller[00000000004060e4]: ret_from_fork+0x1c/0x2c
May 04 10:57:06 deb4g kernel: Caller[0000000000000000]:           (null)
May 04 10:57:06 deb4g kernel: Instruction DUMP: 00000000  00000000  00000000 <00000000> 00000000  00000000  00000000  00000000  00000000 
May 04 10:57:09 deb4g kernel: ------------[ cut here ]------------
May 04 10:57:09 deb4g kernel: WARNING: CPU: 1 PID: 0 at /build/linux-niWLGx/linux-4.5.2/net/sched/sch_generic.c:303 dev_watchdog+0x26c/0x280()
May 04 10:57:09 deb4g kernel: NETDEV WATCHDOG: eth0 (vnet_port): transmit queue 5 timed out
May 04 10:57:09 deb4g kernel: Modules linked in: tun(E) camellia_sparc64(E) des_sparc64(E) des_generic(E) md5_sparc64(E) sha512_sparc64(E) sha256_sp
May 04 10:57:09 deb4g kernel: CPU: 1 PID: 0 Comm: swapper/1 Tainted: G      D W   E   4.5.0-2-sparc64-smp #1 Debian 4.5.2-1
May 04 10:57:09 deb4g kernel: Call Trace:
May 04 10:57:09 deb4g kernel:  [00000000004669d0] warn_slowpath_common+0x70/0xc0
May 04 10:57:09 deb4g kernel:  [0000000000466a50] warn_slowpath_fmt+0x30/0x40
May 04 10:57:09 deb4g kernel:  [000000000088050c] dev_watchdog+0x26c/0x280
May 04 10:57:09 deb4g kernel:  [00000000004ce638] call_timer_fn+0x18/0x160
May 04 10:57:09 deb4g kernel:  [00000000004ce994] run_timer_softirq+0x214/0x2e0
May 04 10:57:09 deb4g kernel:  [000000000046b340] __do_softirq+0xe0/0x2e0
May 04 10:57:09 deb4g kernel:  [000000000042c014] do_softirq_own_stack+0x34/0x60
May 04 10:57:09 deb4g kernel:  [000000000046b728] irq_exit+0xa8/0xc0
May 04 10:57:09 deb4g kernel:  [000000000096b968] timer_interrupt+0x88/0xe0
May 04 10:57:09 deb4g kernel:  [00000000004209d4] tl0_irq14+0x14/0x20
May 04 10:57:09 deb4g kernel:  [000000000042c7dc] arch_cpu_idle+0x7c/0xa0
May 04 10:57:09 deb4g kernel:  [00000000004a87a8] default_idle_call+0x28/0x60
May 04 10:57:09 deb4g kernel:  [00000000004a8a48] cpu_startup_entry+0x268/0x320
May 04 10:57:09 deb4g kernel:  [000000000043f154] smp_callin+0x114/0x160
May 04 10:57:09 deb4g kernel:  [0000000000b02974] 0xb02974
May 04 10:57:09 deb4g kernel:  [0000000000000000]           (null)
May 04 10:57:09 deb4g kernel: ---[ end trace 1d473d9e3fa72408 ]---
Comment 7 Anatoly Pugachev 2016-06-16 08:55:43 UTC
Jun 15 22:49:27 landau.east.ru kernel: ds-0: Machine description update.
Jun 15 22:49:27 landau.east.ru kernel: VIO: Removing device vnet-port-0-2
Jun 15 22:49:27 landau.east.ru kernel:               \|/ ____ \|/
                                                     "@'/ .. \`@"
                                                     /_| \__/ |_\
                                                        \__U_/
Jun 15 22:49:27 landau.east.ru kernel: kldomd(789): Kernel illegal instruction [#1]
Jun 15 22:49:27 landau.east.ru kernel: CPU: 120 PID: 789 Comm: kldomd Not tainted 4.6.0-1-sparc64-smp #1 Debian 4.6.1-1
Jun 15 22:49:27 landau.east.ru kernel: task: fff800202210ef60 ti: fff8002022114000 task.ti: fff8002022114000
Jun 15 22:49:27 landau.east.ru kernel: TSTATE: 0000004480e01605 TPC: 0000000000ba3e50 TNPC: 0000000000ba3e54 Y: 0000001b    Not tainted
Jun 15 22:49:27 landau.east.ru kernel: TPC: <mdesc_memblock_free+0x0/0x74>
Jun 15 22:49:27 landau.east.ru kernel: g0: 0000000000a34160 g1: 0000000000ba3e50 g2: 0000000000000000 g3: 0000000000000000
Jun 15 22:49:27 landau.east.ru kernel: g4: fff800202210ef60 g5: fff800207d6f8000 g6: fff8002022114000 g7: 0000000000000001
Jun 15 22:49:27 landau.east.ru kernel: o0: fff800207fec4000 o1: 0000000000afa400 o2: 0000000000000001 o3: 00000000004507a0
Jun 15 22:49:27 landau.east.ru kernel: o4: 0000000000a8b240 o5: 00000000000016be sp: fff8002022117301 ret_pc: 000000000043d12c
Jun 15 22:49:27 landau.east.ru kernel: RPC: <mdesc_update+0x10c/0x1a0>
Jun 15 22:49:27 landau.east.ru kernel: l0: fff8002025225b00 l1: 0000000080001604 l2: fff8001ced012860 l3: 0000000000000400
Jun 15 22:49:27 landau.east.ru kernel: l4: 0000000000000000 l5: 0000000000000000 l6: 0000000000000000 l7: 0000000000000008
Jun 15 22:49:27 landau.east.ru kernel: i0: 0000000000000021 i1: 0000000000afa400 i2: 0000000000c25800 i3: fff800207fec4000
Jun 15 22:49:27 landau.east.ru kernel: i4: fff80011ef280000 i5: 0000000000000000 i6: fff80020221173c1 i7: 0000000000452b00
Jun 15 22:49:27 landau.east.ru kernel: I7: <md_update_data+0x20/0x60>
Jun 15 22:49:27 landau.east.ru kernel: Call Trace:
Jun 15 22:49:27 landau.east.ru kernel:  [0000000000452b00] md_update_data+0x20/0x60
Jun 15 22:49:27 landau.east.ru kernel:  [00000000004520a8] ds_thread+0x1a8/0x1e0
Jun 15 22:49:27 landau.east.ru kernel:  [000000000048786c] kthread+0xac/0xe0
Jun 15 22:49:27 landau.east.ru kernel:  [00000000004060a4] ret_from_fork+0x1c/0x2c
Jun 15 22:49:27 landau.east.ru kernel:  [0000000000000000]           (null)
Jun 15 22:49:27 landau.east.ru kernel: Disabling lock debugging due to kernel taint
Jun 15 22:49:27 landau.east.ru kernel: Caller[0000000000452b00]: md_update_data+0x20/0x60
Jun 15 22:49:27 landau.east.ru kernel: Caller[00000000004520a8]: ds_thread+0x1a8/0x1e0
Jun 15 22:49:27 landau.east.ru kernel: Caller[000000000048786c]: kthread+0xac/0xe0
Jun 15 22:49:27 landau.east.ru kernel: Caller[00000000004060a4]: ret_from_fork+0x1c/0x2c
Jun 15 22:49:27 landau.east.ru kernel: Caller[0000000000000000]:           (null)
Jun 15 22:49:27 landau.east.ru kernel: Instruction DUMP: 6ffffef5  00000000  00000210 <00000000> 00000005  00000000  00004058  00000000  00000006 
Jun 15 22:49:28 landau.east.ru kernel: ------------[ cut here ]------------
Jun 15 22:49:28 landau.east.ru kernel: WARNING: CPU: 98 PID: 0 at /build/linux-PVkSnE/linux-4.6.1/net/sched/sch_generic.c:306 dev_watchdog+0x274/0x2a0
Jun 15 22:49:28 landau.east.ru kernel: NETDEV WATCHDOG: eth0 (vnet_port): transmit queue 2 timed out
Jun 15 22:49:28 landau.east.ru kernel: Modules linked in: tun xt_tcpudp xt_multiport xt_conntrack iptable_filter iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack ip_tables x_tables n2_rng camellia_sparc64 des_sparc64 des_generic rng_core md5_sparc64 sha512_sparc64 sha256_sparc64 sha1_sparc64 autofs4 ext4 ecb crc16 jbd2 mbcache btrfs crc32c_generic xor zlib_deflate raid6_pq crc32c_sparc64 aes_sparc64 sunvnet sunvdc
Jun 15 22:49:28 landau.east.ru kernel: CPU: 98 PID: 0 Comm: swapper/98 Tainted: G      D         4.6.0-1-sparc64-smp #1 Debian 4.6.1-1
Jun 15 22:49:28 landau.east.ru kernel: Call Trace:
Jun 15 22:49:28 landau.east.ru kernel:  [0000000000466cc0] __warn+0xc0/0xe0
Jun 15 22:49:28 landau.east.ru kernel:  [0000000000466d14] warn_slowpath_fmt+0x34/0x60
Jun 15 22:49:28 landau.east.ru kernel:  [0000000000889bb4] dev_watchdog+0x274/0x2a0
Jun 15 22:49:28 landau.east.ru kernel:  [00000000004d0898] call_timer_fn+0x18/0x160
Jun 15 22:49:28 landau.east.ru kernel:  [00000000004d0bf4] run_timer_softirq+0x214/0x2e0
Jun 15 22:49:28 landau.east.ru kernel:  [0000000000976a80] __do_softirq+0xe0/0x2e0
Jun 15 22:49:28 landau.east.ru kernel:  [000000000042c014] do_softirq_own_stack+0x34/0x60
Jun 15 22:49:28 landau.east.ru kernel:  [000000000046cdc8] irq_exit+0xa8/0xc0
Jun 15 22:49:28 landau.east.ru kernel:  [0000000000976728] timer_interrupt+0x88/0xe0
Jun 15 22:49:28 landau.east.ru kernel:  [00000000004209d4] tl0_irq14+0x14/0x20
Jun 15 22:49:28 landau.east.ru kernel:  [000000000042c7dc] arch_cpu_idle+0x7c/0xa0
Jun 15 22:49:28 landau.east.ru kernel:  [00000000004aa048] default_idle_call+0x28/0x60
Jun 15 22:49:28 landau.east.ru kernel:  [00000000004aa2e8] cpu_startup_entry+0x268/0x2e0
Jun 15 22:49:28 landau.east.ru kernel:  [000000000043f194] smp_callin+0x114/0x160
Jun 15 22:49:28 landau.east.ru kernel:  [0000000000afae74] 0xafae74
Jun 15 22:49:28 landau.east.ru kernel:  [0000000000000000]           (null)
Jun 15 22:49:28 landau.east.ru kernel: ---[ end trace 1121ad02337165b3 ]---
Comment 8 Anatoly Pugachev 2016-08-01 19:48:52 UTC
Aug 01 15:47:18 ttip kernel: ds-0: Machine description update.
Aug 01 15:47:18 ttip kernel: VIO: Adding device vnet-port-0-5
Aug 01 15:47:18 ttip kernel: sunvnet: eth0: PORT ( remote-mac 00:14:4f:f9:5a:4b )
Aug 01 15:47:56 ttip kernel: ds-0: Machine description update.
Aug 01 15:47:56 ttip kernel: VIO: Removing device vnet-port-0-5
Aug 01 15:47:57 ttip kernel: ------------[ cut here ]------------
Aug 01 15:47:57 ttip kernel: WARNING: CPU: 17 PID: 0 at /build/linux-LiNZ0v/linux-4.7~rc7/net/sched/sch_generic.c:272 dev_watchdog+0x26c/0x280
Aug 01 15:47:57 ttip kernel: NETDEV WATCHDOG: eth0 (vnet_port): transmit queue 5 timed out
Aug 01 15:47:57 ttip kernel: Modules linked in: xfs libcrc32c camellia_sparc64 n2_rng rng_core des_sparc64 flash des_generic md5_sparc64 sha512_sparc64 sha256_sparc64 sha1_sparc64 autofs4 ext4 ecb crc16 jbd2 crc32c_generic mbcache crc32c_sparc64 aes_sparc64 sunvnet sunvdc
Aug 01 15:47:57 ttip kernel: CPU: 17 PID: 0 Comm: swapper/17 Not tainted 4.7.0-rc7-sparc64-smp #1 Debian 4.7~rc7-1~exp1
Aug 01 15:47:57 ttip kernel: Call Trace:
Aug 01 15:47:57 ttip kernel:  [0000000000467260] __warn+0xc0/0xe0
Aug 01 15:47:57 ttip kernel:  [00000000004672b4] warn_slowpath_fmt+0x34/0x60
Aug 01 15:47:57 ttip kernel:  [000000000089386c] dev_watchdog+0x26c/0x280
Aug 01 15:47:57 ttip kernel:  [00000000004d1918] call_timer_fn+0x18/0x160
Aug 01 15:47:57 ttip kernel:  [00000000004d1c74] run_timer_softirq+0x214/0x2e0
Aug 01 15:47:57 ttip kernel:  [0000000000980e00] __do_softirq+0xe0/0x2e0
Aug 01 15:47:57 ttip kernel:  [000000000042c134] do_softirq_own_stack+0x34/0x60
Aug 01 15:47:57 ttip kernel:  [000000000046d370] irq_exit+0xb0/0xc0
Aug 01 15:47:57 ttip kernel:  [0000000000980aa8] timer_interrupt+0x88/0xe0
Aug 01 15:47:57 ttip kernel:  [00000000004209d4] tl0_irq14+0x14/0x20
Aug 01 15:47:57 ttip kernel:  [000000000042c8fc] arch_cpu_idle+0x7c/0xa0
Aug 01 15:47:57 ttip kernel:  [00000000004aa488] default_idle_call+0x28/0x60
Aug 01 15:47:57 ttip kernel:  [00000000004aa728] cpu_startup_entry+0x268/0x2e0
Aug 01 15:47:57 ttip kernel:  [000000000043f2c4] smp_callin+0x104/0x140
Aug 01 15:47:57 ttip kernel:  [0000000000b0a3b4] 0xb0a3b4
Aug 01 15:47:57 ttip kernel:  [0000000000000000]           (null)
Aug 01 15:47:57 ttip kernel: ---[ end trace e5077db2224615f2 ]---
Comment 9 Anatoly Pugachev 2016-08-04 10:16:07 UTC
binding/unbinding another LDOM, vsw (virtual switch) creates same vnet-port, which bugs linux kernel, who does not free vnet-port on unbind.


Aug 04 12:32:13 deb4g kernel: ds-0: Machine description update.
Aug 04 12:32:13 deb4g kernel: VIO: Adding device vnet-port-0-4
Aug 04 12:32:13 deb4g kernel: ------------[ cut here ]------------
Aug 04 12:32:13 deb4g kernel: WARNING: CPU: 43 PID: 405 at /build/linux-PVkSnE/linux-4.6.1/fs/sysfs/dir.c:31 sysfs_warn_dup+0x58/0x80
Aug 04 12:32:13 deb4g kernel: sysfs: cannot create duplicate filename '/devices/channel-devices/vnet-port-0-4'
Aug 04 12:32:13 deb4g kernel: Modules linked in: algif_skcipher algif_aead algif_hash af_alg sha256_generic binfmt_misc fuse dm_mirror dm_region_hash dm_log tun nfsd auth_rpcgss oid_registry nfs_acl nfs lockd grace fscache sunrpc camellia_sparc64 des_sparc64 des_generic md5_sparc64 n2_rng sha512_sparc64 rng_core sha256_sparc64 sha1_sparc64 dm_mod autofs4 ext4 ecb crc16 jbd2 mbcache btrfs crc32c_generic xor zlib_deflate raid6_pq crc32c_sparc64 aes_sparc64 sunvnet sunvdc [last unloaded: cryptd]
Aug 04 12:32:13 deb4g kernel: CPU: 43 PID: 405 Comm: kldomd Tainted: G        W       4.6.0-1-sparc64-smp #1 Debian 4.6.1-1
Aug 04 12:32:13 deb4g kernel: Call Trace:
Aug 04 12:32:13 deb4g kernel:  [0000000000466cc0] __warn+0xc0/0xe0
Aug 04 12:32:13 deb4g kernel:  [0000000000466d14] warn_slowpath_fmt+0x34/0x60
Aug 04 12:32:13 deb4g kernel:  [0000000000653578] sysfs_warn_dup+0x58/0x80
Aug 04 12:32:13 deb4g kernel:  [0000000000653688] sysfs_create_dir_ns+0x88/0xa0
Aug 04 12:32:13 deb4g kernel:  [00000000007025e0] kobject_add_internal+0xa0/0x3a0
Aug 04 12:32:13 deb4g kernel:  [0000000000702d6c] kobject_add+0x4c/0xa0
Aug 04 12:32:13 deb4g kernel:  [00000000007c3f20] device_add+0xe0/0x5e0
Aug 04 12:32:13 deb4g kernel:  [00000000007c4434] device_register+0x14/0x40
Aug 04 12:32:13 deb4g kernel:  [0000000000450490] vio_create_one+0x2f0/0x540
Aug 04 12:32:13 deb4g kernel:  [00000000004507bc] vio_add+0x1c/0x60
Aug 04 12:32:13 deb4g kernel:  [000000000043c194] invoke_on_missing+0x114/0x200
Aug 04 12:32:13 deb4g kernel:  [000000000043d0ec] mdesc_update+0xcc/0x1a0
Aug 04 12:32:13 deb4g kernel:  [0000000000452b00] md_update_data+0x20/0x60
Aug 04 12:32:13 deb4g kernel:  [00000000004520a8] ds_thread+0x1a8/0x1e0
Aug 04 12:32:13 deb4g kernel:  [000000000048786c] kthread+0xac/0xe0
Aug 04 12:32:13 deb4g kernel:  [00000000004060a4] ret_from_fork+0x1c/0x2c
Aug 04 12:32:13 deb4g kernel: ---[ end trace 5ab633ea59af2e74 ]---
Aug 04 12:32:13 deb4g kernel: ------------[ cut here ]------------
Aug 04 12:32:13 deb4g kernel: WARNING: CPU: 43 PID: 405 at /build/linux-PVkSnE/linux-4.6.1/lib/kobject.c:240 kobject_add_internal+0x300/0x3a0
Aug 04 12:32:13 deb4g kernel: kobject_add_internal failed for vnet-port-0-4 with -EEXIST, don't try to register things with the same name in the same directory.
Aug 04 12:32:13 deb4g kernel: Modules linked in: algif_skcipher algif_aead algif_hash af_alg sha256_generic binfmt_misc fuse dm_mirror dm_region_hash dm_log tun nfsd auth_rpcgss oid_registry nfs_acl nfs lockd grace fscache sunrpc camellia_sparc64 des_sparc64 des_generic md5_sparc64 n2_rng sha512_sparc64 rng_core sha256_sparc64 sha1_sparc64 dm_mod autofs4 ext4 ecb crc16 jbd2 mbcache btrfs crc32c_generic xor zlib_deflate raid6_pq crc32c_sparc64 aes_sparc64 sunvnet sunvdc [last unloaded: cryptd]
Aug 04 12:32:13 deb4g kernel: CPU: 43 PID: 405 Comm: kldomd Tainted: G        W       4.6.0-1-sparc64-smp #1 Debian 4.6.1-1
Aug 04 12:32:13 deb4g kernel: Call Trace:
Aug 04 12:32:13 deb4g kernel:  [0000000000466cc0] __warn+0xc0/0xe0
Aug 04 12:32:13 deb4g kernel:  [0000000000466d14] warn_slowpath_fmt+0x34/0x60
Aug 04 12:32:13 deb4g kernel:  [0000000000702840] kobject_add_internal+0x300/0x3a0
Aug 04 12:32:13 deb4g kernel:  [0000000000702d6c] kobject_add+0x4c/0xa0
Aug 04 12:32:13 deb4g kernel:  [00000000007c3f20] device_add+0xe0/0x5e0
Aug 04 12:32:13 deb4g kernel:  [00000000007c4434] device_register+0x14/0x40
Aug 04 12:32:13 deb4g kernel:  [0000000000450490] vio_create_one+0x2f0/0x540
Aug 04 12:32:13 deb4g kernel:  [00000000004507bc] vio_add+0x1c/0x60
Aug 04 12:32:13 deb4g kernel:  [000000000043c194] invoke_on_missing+0x114/0x200
Aug 04 12:32:13 deb4g kernel:  [000000000043d0ec] mdesc_update+0xcc/0x1a0
Aug 04 12:32:13 deb4g kernel:  [0000000000452b00] md_update_data+0x20/0x60
Aug 04 12:32:13 deb4g kernel:  [00000000004520a8] ds_thread+0x1a8/0x1e0
Aug 04 12:32:13 deb4g kernel:  [000000000048786c] kthread+0xac/0xe0
Aug 04 12:32:13 deb4g kernel:  [00000000004060a4] ret_from_fork+0x1c/0x2c
Aug 04 12:32:13 deb4g kernel:  [0000000000000000]           (null)
Aug 04 12:32:13 deb4g kernel: ---[ end trace 5ab633ea59af2e75 ]---
Aug 04 12:32:13 deb4g kernel: VIO: Could not register device vnet-port-0-4, err=-17
Comment 10 Anatoly Pugachev 2016-09-10 07:27:29 UTC
unbind another domain at 9:57 and bind it back at 10:21

Sep 10 09:57:33 landau kernel: ds-0: Machine description update.
Sep 10 09:57:33 landau kernel: VIO: Removing device vnet-port-0-4
Sep 10 09:57:33 landau kernel: ------------[ cut here ]------------
Sep 10 09:57:33 landau kernel: WARNING: CPU: 40 PID: 0 at /build/linux-LiNZ0v/linux-4.7~rc7/net/sched/sch_generic.c:272 dev_watchdog+0x26c/0x280
Sep 10 09:57:33 landau kernel: NETDEV WATCHDOG: eth0 (vnet_port): transmit queue 4 timed out
Sep 10 09:57:33 landau kernel: Modules linked in: tun xt_tcpudp xt_multiport xt_conntrack iptable_filter iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_c
Sep 10 09:57:33 landau kernel: CPU: 40 PID: 0 Comm: swapper/40 Not tainted 4.7.0-rc7-sparc64-smp #1 Debian 4.7~rc7-1~exp1
Sep 10 09:57:33 landau kernel: Call Trace:
Sep 10 09:57:33 landau kernel:  [0000000000467260] __warn+0xc0/0xe0
Sep 10 09:57:33 landau kernel:  [00000000004672b4] warn_slowpath_fmt+0x34/0x60
Sep 10 09:57:33 landau kernel:  [000000000089386c] dev_watchdog+0x26c/0x280
Sep 10 09:57:33 landau kernel:  [00000000004d1918] call_timer_fn+0x18/0x160
Sep 10 09:57:33 landau kernel:  [00000000004d1c74] run_timer_softirq+0x214/0x2e0
Sep 10 09:57:33 landau kernel:  [0000000000980e00] __do_softirq+0xe0/0x2e0
Sep 10 09:57:33 landau kernel:  [000000000042c134] do_softirq_own_stack+0x34/0x60
Sep 10 09:57:33 landau kernel:  [000000000046d370] irq_exit+0xb0/0xc0
Sep 10 09:57:33 landau kernel:  [0000000000980aa8] timer_interrupt+0x88/0xe0
Sep 10 09:57:33 landau kernel:  [00000000004209d4] tl0_irq14+0x14/0x20
Sep 10 09:57:33 landau kernel:  [000000000042c8fc] arch_cpu_idle+0x7c/0xa0
Sep 10 09:57:33 landau kernel:  [00000000004aa488] default_idle_call+0x28/0x60
Sep 10 09:57:33 landau kernel:  [00000000004aa728] cpu_startup_entry+0x268/0x2e0
Sep 10 09:57:33 landau kernel:  [000000000043f2c4] smp_callin+0x104/0x140
Sep 10 09:57:33 landau kernel:  [0000000000b0a3b4] 0xb0a3b4
Sep 10 09:57:33 landau kernel:  [0000000000000000]           (null)
Sep 10 09:57:33 landau kernel: ---[ end trace ea82c851d776e996 ]---
Sep 10 10:21:13 landau kernel: ds-0: Machine description update.
Sep 10 10:21:13 landau kernel: VIO: Adding device vnet-port-0-4
Sep 10 10:21:13 landau kernel: sunvnet: eth0: PORT ( remote-mac 00:14:4f:f8:12:a3 )


this stack trace does not affect domain work afterwards.
Comment 11 Anatoly Pugachev 2017-01-16 11:56:37 UTC
Jan 16 12:37:40 landau kernel: ds-0: Machine description update.
Jan 16 12:37:40 landau kernel: VIO: Adding device vnet-port-0-5
Jan 16 12:37:40 landau kernel: sunvnet: eth0: PORT ( remote-mac 00:14:4f:fa:41:b1 )
Jan 16 14:53:06 landau kernel: ds-0: Machine description update.
Jan 16 14:53:06 landau kernel: VIO: Removing device vnet-port-0-5
Jan 16 14:53:08 landau kernel: ------------[ cut here ]------------
Jan 16 14:53:08 landau kernel: WARNING: CPU: 61 PID: 0 at net/sched/sch_generic.c:316 dev_watchdog+0x26c/0x280
Jan 16 14:53:08 landau kernel: NETDEV WATCHDOG: eth0 (vnet_port): transmit queue 5 timed out
Jan 16 14:53:08 landau kernel: Modules linked in: dccp_ipv4 dccp netlink_diag unix_diag tcp_diag inet_diag tun xt_tcpudp xt_multiport xt_conntrack iptable_filter iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack n2_rng flash rng_core camellia_sparc64 des_sparc64 des_generic aes_sparc64 md5_sparc64 sha512_sparc64 sha256_sparc64 sha1_sparc64 ip_tables x_tables autofs4 ext4 crc16 jbd2 fscrypto mbcache btrfs xor zlib_deflate raid6_pq crc32c_sparc64 sunvnet sunvdc
Jan 16 14:53:08 landau kernel: CPU: 61 PID: 0 Comm: swapper/61 Tainted: G             L  4.9.0-rc5+ #2
Jan 16 14:53:08 landau kernel: Call Trace:
Jan 16 14:53:08 landau kernel:  [0000000000468520] __warn+0xc0/0xe0
Jan 16 14:53:08 landau kernel:  [0000000000468574] warn_slowpath_fmt+0x34/0x60
Jan 16 14:53:08 landau kernel:  [000000000094d1ec] dev_watchdog+0x26c/0x280
Jan 16 14:53:08 landau kernel:  [0000000000500564] call_timer_fn+0x84/0x440
Jan 16 14:53:08 landau kernel:  [0000000000500b10] expire_timers+0x1f0/0x2a0
Jan 16 14:53:08 landau kernel:  [0000000000500d04] run_timer_softirq+0x84/0xe0
Jan 16 14:53:08 landau kernel:  [0000000000a72bb8] __do_softirq+0x138/0x5c0
Jan 16 14:53:08 landau kernel:  [000000000042c1b4] do_softirq_own_stack+0x34/0x60
Jan 16 14:53:08 landau kernel:  [0000000000470cc8] irq_exit+0xc8/0x100
Jan 16 14:53:08 landau kernel:  [0000000000a727e8] timer_interrupt+0x88/0xe0
Jan 16 14:53:08 landau kernel:  [0000000000426bf4] sys_call_table+0x654/0x820
Jan 16 14:53:08 landau kernel:  [000000000042c980] arch_cpu_idle+0xa0/0xc0
Jan 16 14:53:08 landau kernel:  [0000000000a6fd88] default_idle_call+0x28/0x60
Jan 16 14:53:08 landau kernel:  [00000000004c0154] cpu_startup_entry+0xf4/0x1e0
Jan 16 14:53:08 landau kernel:  [000000000043edb8] smp_callin+0x118/0x160
Jan 16 14:53:08 landau kernel:  [0000000000c86824] after_lock_tlb+0x1a8/0x1bc
Jan 16 14:53:08 landau kernel: ---[ end trace c50434d647ae1d18 ]---
Comment 12 Anatoly Pugachev 2017-02-24 13:47:23 UTC
Feb 24 11:39:29 ttip kernel: ds-0: Machine description update.
Feb 24 11:39:29 ttip kernel: VIO: Removing device vnet-port-0-2
Feb 24 11:39:30 ttip kernel:               \|/ ____ \|/
                                           "@'/ .. \`@"
                                           /_| \__/ |_\
                                              \__U_/
Feb 24 11:39:30 ttip kernel: kldomd(217): Kernel illegal instruction [#1]
Feb 24 11:39:30 ttip kernel: CPU: 29 PID: 217 Comm: kldomd Not tainted 4.10.0-06476-gbc49a7831b11 #72
Feb 24 11:39:30 ttip kernel: task: fff8000811bf9c00 task.stack: fff8000811bfc000
Feb 24 11:39:30 ttip kernel: TSTATE: 0000004480e01605 TPC: 0000000000d51eec TNPC: 0000000000d51ef0 Y: 00000058    Not tainted
Feb 24 11:39:30 ttip kernel: TPC: <mdesc_memblock_free+0x0/0x74>
Feb 24 11:39:30 ttip kernel: g0: 0000000000bc4308 g1: 0000000000d51eec g2: 00000000ffffffff g3: 000000000000000d
Feb 24 11:39:30 ttip kernel: g4: fff8000811bf9c00 g5: fff800082c5d2000 g6: fff8000811bfc000 g7: 0000000000000001
Feb 24 11:39:30 ttip kernel: o0: fff800082f866000 o1: fff800082f866020 o2: 0000000000000001 o3: 0000000000451220
Feb 24 11:39:30 ttip kernel: o4: 0000000000c26be8 o5: 0000000000c863c8 sp: fff8000811bff361 ret_pc: 000000000043d004
Feb 24 11:39:30 ttip kernel: RPC: <mdesc_update+0x144/0x1c0>
Feb 24 11:39:30 ttip kernel: l0: 0000000001601400 l1: 000000000000000e l2: 0000000000000001 l3: fff8000811bfa3f8
Feb 24 11:39:30 ttip kernel: l4: 00000fff00000000 l5: 0006000000000000 l6: 0000000000000000 l7: 0000000000000000
Feb 24 11:39:30 ttip kernel: i0: 0000000000000021 i1: 0000000000c86000 i2: 0000000000c86000 i3: fff800080eb40000
Feb 24 11:39:30 ttip kernel: i4: fff800082f866000 i5: 0000000000000000 i6: fff8000811bff421 i7: 00000000004535e0
Feb 24 11:39:30 ttip kernel: I7: <md_update_data+0x20/0x60>
Feb 24 11:39:30 ttip kernel: Call Trace:
Feb 24 11:39:30 ttip kernel:  [00000000004535e0] md_update_data+0x20/0x60
Feb 24 11:39:30 ttip kernel:  [0000000000452b98] ds_thread+0x1b8/0x1e0
Feb 24 11:39:30 ttip kernel:  [000000000049282c] kthread+0xec/0x140
Feb 24 11:39:30 ttip kernel:  [0000000000406084] ret_from_fork+0x1c/0x2c
Feb 24 11:39:30 ttip kernel:  [0000000000000000]           (null)
Feb 24 11:39:30 ttip kernel: Disabling lock debugging due to kernel taint
Feb 24 11:39:30 ttip kernel: Caller[00000000004535e0]: md_update_data+0x20/0x60
Feb 24 11:39:30 ttip kernel: Caller[0000000000452b98]: ds_thread+0x1b8/0x1e0
Feb 24 11:39:30 ttip kernel: Caller[000000000049282c]: kthread+0xec/0x140
Feb 24 11:39:30 ttip kernel: Caller[0000000000406084]: ret_from_fork+0x1c/0x2c
Feb 24 11:39:30 ttip kernel: Caller[0000000000000000]:           (null)
Feb 24 11:39:30 ttip kernel: Instruction DUMP:
Feb 24 11:39:30 ttip kernel:  00000000 
Feb 24 11:39:30 ttip kernel:  00000000 
Feb 24 11:39:30 ttip kernel:  00000000 
Feb 24 11:39:30 ttip kernel: <00000000>
Feb 24 11:39:30 ttip kernel:  00000000 
Feb 24 11:39:30 ttip kernel:  00000000 
Feb 24 11:39:30 ttip kernel:  00000000 
Feb 24 11:39:30 ttip kernel:  00000000 
Feb 24 11:39:30 ttip kernel:  a4810000 
Feb 24 11:39:30 ttip kernel: 
Feb 24 11:39:30 ttip kernel: BUG: sleeping function called from invalid context at ./include/linux/sched.h:3147
Feb 24 11:39:30 ttip kernel: in_atomic(): 1, irqs_disabled(): 1, pid: 217, name: kldomd
Feb 24 11:39:30 ttip kernel: INFO: lockdep is turned off.
Feb 24 11:39:30 ttip kernel: irq event stamp: 222
Feb 24 11:39:30 ttip kernel: hardirqs last  enabled at (221): [<000000000062571c>] kfree+0xbc/0x280
Feb 24 11:39:30 ttip kernel: hardirqs last disabled at (222): [<0000000000a8aef8>] _raw_spin_lock_irqsave+0x18/0x60
Feb 24 11:39:30 ttip kernel: softirqs last  enabled at (202): [<000000000091430c>] peernet2id+0x2c/0x40
Feb 24 11:39:30 ttip kernel: softirqs last disabled at (200): [<00000000009142ec>] peernet2id+0xc/0x40
Feb 24 11:39:30 ttip kernel: CPU: 29 PID: 217 Comm: kldomd Tainted: G      D         4.10.0-06476-gbc49a7831b11 #72
Feb 24 11:39:30 ttip kernel: Call Trace:
Feb 24 11:39:30 ttip kernel:  [000000000049c280] ___might_sleep+0x160/0x280
Feb 24 11:39:30 ttip kernel:  [000000000049c3e8] __might_sleep+0x48/0xa0
Feb 24 11:39:30 ttip kernel:  [000000000047e9d8] exit_signals+0x18/0x280
Feb 24 11:39:30 ttip kernel:  [000000000046f710] do_exit+0x90/0xd20
Feb 24 11:39:30 ttip kernel:  [0000000000429fec] die_if_kernel+0x16c/0x300
Feb 24 11:39:30 ttip kernel:  [000000000042af5c] do_illegal_instruction+0x17c/0x1a0
Feb 24 11:39:30 ttip kernel:  [0000000000420210] tl0_ill+0x10/0x20
Feb 24 11:39:30 ttip kernel:  [0000000000d51eec] mdesc_memblock_free+0x0/0x74
Feb 24 11:39:30 ttip kernel:  [00000000004535e0] md_update_data+0x20/0x60
Feb 24 11:39:30 ttip kernel:  [0000000000452b98] ds_thread+0x1b8/0x1e0
Feb 24 11:39:30 ttip kernel:  [000000000049282c] kthread+0xec/0x140
Feb 24 11:39:30 ttip kernel:  [0000000000406084] ret_from_fork+0x1c/0x2c
Feb 24 11:39:30 ttip kernel:  [0000000000000000]           (null)
Feb 24 11:39:30 ttip kernel: note: kldomd[217] exited with preempt_count 1
Feb 24 11:39:34 ttip kernel: ------------[ cut here ]------------
Feb 24 11:39:34 ttip kernel: WARNING: CPU: 3 PID: 0 at net/sched/sch_generic.c:316 dev_watchdog+0x26c/0x280
Feb 24 11:39:34 ttip kernel: NETDEV WATCHDOG: eth0 (vnet_port): transmit queue 2 timed out
Feb 24 11:39:34 ttip kernel: Modules linked in: btrfs zlib_deflate camellia_sparc64 des_sparc64 des_generic flash aes_sparc64 md5_sparc64 sha512_sparc64 sha
Feb 24 11:39:34 ttip kernel: CPU: 3 PID: 0 Comm: swapper/3 Tainted: G      D W       4.10.0-06476-gbc49a7831b11 #72
Feb 24 11:39:34 ttip kernel: Call Trace:
Feb 24 11:39:34 ttip kernel:  [0000000000469180] __warn+0xc0/0xe0
Feb 24 11:39:34 ttip kernel:  [00000000004691d4] warn_slowpath_fmt+0x34/0x60
Feb 24 11:39:34 ttip kernel:  [000000000095c8ac] dev_watchdog+0x26c/0x280
Feb 24 11:39:34 ttip kernel:  [00000000004fe084] call_timer_fn+0x84/0x440
Feb 24 11:39:34 ttip kernel:  [00000000004fe624] expire_timers+0x1e4/0x260
Feb 24 11:39:34 ttip kernel:  [00000000004fe7e4] run_timer_softirq+0x84/0xe0
Feb 24 11:39:34 ttip kernel:  [0000000000a8db18] __do_softirq+0x138/0x5c0
Feb 24 11:39:34 ttip kernel:  [000000000042c3d4] do_softirq_own_stack+0x34/0x60
Feb 24 11:39:34 ttip kernel:  [00000000004716a8] irq_exit+0xc8/0x100
Feb 24 11:39:34 ttip kernel:  [0000000000a8d748] timer_interrupt+0x88/0xe0
Feb 24 11:39:34 ttip kernel:  [0000000000426bf4] sys_call_table+0x654/0x820
Feb 24 11:39:34 ttip kernel:  [000000000042ca40] arch_cpu_idle+0xa0/0xc0
Feb 24 11:39:34 ttip kernel:  [0000000000a8ad28] default_idle_call+0x28/0x60
Feb 24 11:39:34 ttip kernel:  [00000000004c398c] do_idle+0xcc/0x1a0
Feb 24 11:39:34 ttip kernel:  [00000000004c3de4] cpu_startup_entry+0x24/0x40
Feb 24 11:39:34 ttip kernel:  [000000000043f198] smp_callin+0x118/0x160
Feb 24 11:39:34 ttip kernel: ---[ end trace ea8f3607ffbfddb2 ]---
Comment 13 Anatoly Pugachev 2017-05-23 12:56:19 UTC
still valid for 4.12.0-rc2-00049-gfde8e33d1068


May 23 15:27:15 ttip kernel: ds-0: Machine description update.
May 23 15:27:15 ttip kernel: VIO: Removing device vnet-port-0-2
May 23 15:43:42 ttip kernel: ds-0: Machine description update.
May 23 15:43:42 ttip kernel: VIO: Adding device vnet-port-0-2
May 23 15:43:42 ttip kernel: sunvnet: eth0: PORT ( remote-mac 00:14:4f:f8:38:39 )
May 23 15:43:59 ttip kernel: ds-0: Machine description update.
May 23 15:43:59 ttip kernel: VIO: Removing device vnet-port-0-3
May 23 15:44:02 ttip kernel: ds-0: Machine description update.
May 23 15:44:02 ttip kernel: VIO: Adding device vnet-port-0-2
May 23 15:44:02 ttip kernel: ------------[ cut here ]------------
May 23 15:44:02 ttip kernel: WARNING: CPU: 35 PID: 315 at fs/sysfs/dir.c:31 sysfs_warn_dup+0x58/0x80
May 23 15:44:02 ttip kernel: sysfs: cannot create duplicate filename '/devices/channel-devices/vnet-port-0-2'
May 23 15:44:02 ttip kernel: Modules linked in: overlay xfs tun camellia_sparc64 des_sparc64 des_generic aes_sparc64 md5_sparc64 sha512_sparc64 sha2
56_sparc64 sha1_sparc64 n2_rng rng_core flash nf_nat_pptp nf_nat_proto_gre nf_conntrack_pptp nf_conntrack_proto_gre nf_nat nf_conntrack ip_tables x_
tables autofs4 ext4 crc16 jbd2 mbcache raid10 raid456 libcrc32c crc32c_generic async_raid6_recov async_memcpy async_pq raid6_pq async_xor xor async_
tx raid1 raid0 multipath linear md_mod crc32c_sparc64 sunvnet sunvdc
May 23 15:44:02 ttip kernel: CPU: 35 PID: 315 Comm: kldomd Not tainted 4.12.0-rc2-00049-gfde8e33d1068-dirty #316
May 23 15:44:02 ttip kernel: Call Trace:
May 23 15:44:02 ttip kernel:  [000000000046b194] __warn+0xb4/0xe0
May 23 15:44:02 ttip kernel:  [000000000046b1f4] warn_slowpath_fmt+0x34/0x60
May 23 15:44:02 ttip kernel:  [00000000006eaeb8] sysfs_warn_dup+0x58/0x80
May 23 15:44:02 ttip kernel:  [00000000006eafb8] sysfs_create_dir_ns+0x78/0xa0
May 23 15:44:02 ttip kernel:  [00000000007bb678] kobject_add_internal+0x118/0x3a0
May 23 15:44:02 ttip kernel:  [00000000007bb97c] kobject_add+0x7c/0xa0
May 23 15:44:02 ttip kernel:  [000000000088c2a0] device_add+0x100/0x620
May 23 15:44:02 ttip kernel:  [000000000088c7d4] device_register+0x14/0x40
May 23 15:44:02 ttip kernel:  [0000000000450b4c] vio_create_one+0x42c/0x540
May 23 15:44:02 ttip kernel:  [0000000000450d1c] vio_add+0x1c/0x40
May 23 15:44:02 ttip kernel:  [000000000043c04c] invoke_on_missing+0x18c/0x1e0
May 23 15:44:02 ttip kernel:  [000000000043cee8] mdesc_update+0x128/0x1a0
May 23 15:44:02 ttip kernel:  [00000000004530a0] md_update_data+0x20/0x60
May 23 15:44:02 ttip kernel:  [0000000000452710] ds_thread+0x190/0x1e0
May 23 15:44:02 ttip kernel:  [0000000000493d58] kthread+0x118/0x140
May 23 15:44:02 ttip kernel:  [0000000000406084] ret_from_fork+0x1c/0x2c
May 23 15:44:02 ttip kernel: ---[ end trace 567c1cafb6220925 ]---
May 23 15:44:02 ttip kernel: ------------[ cut here ]------------
May 23 15:44:02 ttip kernel: WARNING: CPU: 35 PID: 315 at lib/kobject.c:240 kobject_add_internal+0x2a4/0x3a0
May 23 15:44:02 ttip kernel: kobject_add_internal failed for vnet-port-0-2 with -EEXIST, don't try to register things with the same name in the same directory.
May 23 15:44:02 ttip kernel: Modules linked in: overlay xfs tun camellia_sparc64 des_sparc64 des_generic aes_sparc64 md5_sparc64 sha512_sparc64 sha256_sparc64 sha1_sparc64 n2_rng rng_core flash nf_nat_pptp nf_nat_proto_gre nf_conntrack_pptp nf_conntrack_proto_gre nf_nat nf_conntrack ip_tables x_tables autofs4 ext4 crc16 jbd2 mbcache raid10 raid456 libcrc32c crc32c_generic async_raid6_recov async_memcpy async_pq raid6_pq async_xor xor async_tx raid1 raid0 multipath linear md_mod crc32c_sparc64 sunvnet sunvdc
May 23 15:44:02 ttip kernel: CPU: 35 PID: 315 Comm: kldomd Tainted: G        W       4.12.0-rc2-00049-gfde8e33d1068-dirty #316
May 23 15:44:02 ttip kernel: Call Trace:
May 23 15:44:02 ttip kernel:  [000000000046b194] __warn+0xb4/0xe0
May 23 15:44:02 ttip kernel:  [000000000046b1f4] warn_slowpath_fmt+0x34/0x60
May 23 15:44:02 ttip kernel:  [00000000007bb804] kobject_add_internal+0x2a4/0x3a0
May 23 15:44:02 ttip kernel:  [00000000007bb97c] kobject_add+0x7c/0xa0
May 23 15:44:02 ttip kernel:  [000000000088c2a0] device_add+0x100/0x620
May 23 15:44:02 ttip kernel:  [000000000088c7d4] device_register+0x14/0x40
May 23 15:44:02 ttip kernel:  [0000000000450b4c] vio_create_one+0x42c/0x540
May 23 15:44:02 ttip kernel:  [0000000000450d1c] vio_add+0x1c/0x40
May 23 15:44:02 ttip kernel:  [000000000043c04c] invoke_on_missing+0x18c/0x1e0
May 23 15:44:02 ttip kernel:  [000000000043cee8] mdesc_update+0x128/0x1a0
May 23 15:44:02 ttip kernel:  [00000000004530a0] md_update_data+0x20/0x60
May 23 15:44:02 ttip kernel:  [0000000000452710] ds_thread+0x190/0x1e0
May 23 15:44:02 ttip kernel:  [0000000000493d58] kthread+0x118/0x140
May 23 15:44:02 ttip kernel:  [0000000000406084] ret_from_fork+0x1c/0x2c
May 23 15:44:02 ttip kernel:  [0000000000000000]           (null)
May 23 15:44:02 ttip kernel: ---[ end trace 567c1cafb6220926 ]---
May 23 15:44:02 ttip kernel: VIO: Could not register device vnet-port-0-2, err=-17

mator@ttip:~$ ls /sys/devices/channel-devices/
devspec  modalias  power      type    vdc-port-0-0  vdc-port-2-0  vlds-port-0-0  vnet-port-0-1
ds-0     obppath   subsystem  uevent  vdc-port-1-0  vdc-port-3-0  vnet-port-0-0  vnet-port-0-2


looks like VIO does not remove sysfs devices, so kernel fails to add a new device, which is already exists in sysfs.
Comment 14 Anatoly Pugachev 2017-05-23 13:02:47 UTC
mator@ttip:~$ journalctl -f -k
-- Logs begin at Wed 2016-11-30 10:59:53 MSK. --
May 23 15:44:02 ttip kernel:  [0000000000450d1c] vio_add+0x1c/0x40
May 23 15:44:02 ttip kernel:  [000000000043c04c] invoke_on_missing+0x18c/0x1e0
May 23 15:44:02 ttip kernel:  [000000000043cee8] mdesc_update+0x128/0x1a0
May 23 15:44:02 ttip kernel:  [00000000004530a0] md_update_data+0x20/0x60
May 23 15:44:02 ttip kernel:  [0000000000452710] ds_thread+0x190/0x1e0
May 23 15:44:02 ttip kernel:  [0000000000493d58] kthread+0x118/0x140
May 23 15:44:02 ttip kernel:  [0000000000406084] ret_from_fork+0x1c/0x2c
May 23 15:44:02 ttip kernel:  [0000000000000000]           (null)
May 23 15:44:02 ttip kernel: ---[ end trace 567c1cafb6220926 ]---
May 23 15:44:02 ttip kernel: VIO: Could not register device vnet-port-0-2, err=-17
May 23 16:01:01 ttip kernel: ds-0: Machine description update.
May 23 16:01:01 ttip kernel: VIO: Removing device vnet-port-0-2
^C
mator@ttip:~$ ls /sys/devices/channel-devices/                        
devspec  modalias  power      type    vdc-port-0-0  vdc-port-2-0  vlds-port-0-0  vnet-port-0-1
ds-0     obppath   subsystem  uevent  vdc-port-1-0  vdc-port-3-0  vnet-port-0-0
mator@ttip:~$
Comment 15 Jessica Clarke 2017-05-29 20:41:43 UTC
Proposed patch at http://marc.info/?l=linux-sparc&m=149608549812344.
Comment 16 Anatoly Pugachev 2018-01-01 20:50:47 UTC
I believe it has been fixed, did not seen it for a long time already, currently running 4.15.0-rc6.

Note You need to log in before you can comment on or make changes to this bug.