Gilmar Cabral
unread,Apr 2, 2009, 8:36:47 AM4/2/09Sign in to reply to author
Sign in to forward
You do not have permission to delete messages in this group
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to xen-br
Olá.
Estou com um dom0 rodando 9 maquinas virtualizadas, sendo 2 servidores samba 4 pv, servidores de aplicação tomcat pv, 1 servidor windows 2003 full virtualizado, 1 PDC com samba e ldap pv e 1 com LTSP.
Todos servidores vm estao funcionando perfeitamente, exeto um vm com samba, que toda semana a danada para de acessar , e gera a mensagem mais doidona como esta abaixo, pensei que era o sistema de arquivos, testei com ext3 e reiserfs
e mesmo assim o problema continua.
Alguem sabe o q pode ser? como resolver isto?
Este servidor samba virtualizado tem 25 GB de dados.
O arquivo de configuração esta desta forma abaixo.
import commands
krn_vers = commands.getoutput('uname -r')
builder = 'linux'
name ='agroval'
disk = [ 'phy:/dev/VGxen/debian_agroval.disk1,xvda1,w', 'phy:/dev/VGxen/debian_agroval.disk2,xvda2,w' ]
vif = [ 'mac=00:16:3e:46:44:26, bridge=xenbr1' ]
vcpus = 2
memory = 1024
#apic=1
#acpi=1
kernel = '/boot/vmlinuz-' + krn_vers
ramdisk = '/boot/initrd.img-' + krn_vers
root = '/dev/xvda2 ro'
on_poweroff = 'destroy'
on_reboot = 'restart'
on_crash = 'restart'
extra = 'xencons=xvc console=xvc0 video=tty'
Quando trava o servidor entro pelo console vejo estas mensagem abaixo, ai tive que reiniciar e voltou, so que ta acontecendo toda semana isto, e ta ficando chato.
Debian GNU/Linux 4.0 agroval xvc0
agroval login: Unable to handle kernel paging request at 0000000000100108 RIP:
[<ffffffff802d28bf>] keyring_destroy+0x32/0x96
PGD 25dd4067 PUD 2119f067 PMD 0
Oops: 0002 [1] SMP
CPU 0
Modules linked in: reiserfs dm_mirror dm_snapshot dm_mod processor
Pid: 5, comm: events/0 Not tainted 2.6.18.8-xen #1
RIP: e030:[<ffffffff802d28bf>] [<ffffffff802d28bf>] keyring_destroy+0x32/0x96
RSP: e02b:ffff88003f065e30 EFLAGS: 00010217
RAX: 0000000000200200 RBX: ffff88003643b200 RCX: ffff88003643b278
RDX: 0000000000100100 RSI: ffffffff80561d68 RDI: ffffffff8047eda0
RBP: ffff88003643b208 R08: 00000000ffffffff R09: ffff88003f065e60
R10: ffff88003f065e60 R11: 0000000000000000 R12: ffff880001645c40
R13: 0000000000000000 R14: 0000000000000000 R15: ffffffff802d2203
FS: 00002b47a84d8e80(0000) GS:ffffffff804d8000(0000) knlGS:0000000000000000
CS: e033 DS: 0000 ES: 0000
Process events/0 (pid: 5, threadinfo ffff88003f064000, task ffff8800016310c0)
Stack: ffff88003643b200 ffff88003643b208 ffff880001645c40 ffffffff802d22d8
0000000000000000 ffffffff8047ece0 ffffffff8047ece8 ffffffff8023e8db
000000000000e033 ffff880001645c40 ffffffff8023f339 ffff8800028c1d40
Call Trace:
[<ffffffff802d22d8>] key_cleanup+0xd5/0xf2
[<ffffffff8023e8db>] run_workqueue+0x94/0xe5
[<ffffffff8023f339>] worker_thread+0x0/0x123
[<ffffffff8023f429>] worker_thread+0xf0/0x123
[<ffffffff8022736d>] default_wake_function+0x0/0xe
[<ffffffff80242032>] kthread+0xd4/0x10a
[<ffffffff8020af54>] child_rip+0xa/0x12
[<ffffffff80241f5e>] kthread+0x0/0x10a
[<ffffffff8020af4a>] child_rip+0x0/0x12
Code: 48 89 42 08 48 89 10 48 c7 41 08 00 02 20 00 48 c7 43 78 00
RIP [<ffffffff802d28bf>] keyring_destroy+0x32/0x96
RSP <ffff88003f065e30>
CR2: 0000000000100108
<3>BUG: soft lockup detected on CPU#0!
Call Trace:
<IRQ> [<ffffffff80257ab0>] softlockup_tick+0xd8/0xea
[<ffffffff8020eee2>] timer_interrupt+0x3a7/0x401
[<ffffffff80257d9c>] handle_IRQ_event+0x4e/0x96
[<ffffffff80257e88>] __do_IRQ+0xa4/0x105
[<ffffffff8020cd0e>] do_IRQ+0x44/0x4d
[<ffffffff80233c30>] __do_softirq+0x83/0x117
[<ffffffff8034c915>] evtchn_do_upcall+0x149/0x203
[<ffffffff8020ad02>] do_hypervisor_callback+0x1e/0x2c
<EOI> [<ffffffff802ec76d>] __write_lock_failed+0x9/0x20
[<ffffffff803f6a51>] __down_write_nested+0x12/0xec
[<ffffffff803f740b>] .text.lock.spinlock+0x11/0x8a
[<ffffffff802d27c3>] keyring_publish_name+0x38/0x92
[<ffffffff802d2830>] keyring_instantiate+0x13/0x18
[<ffffffff802d1a78>] __key_instantiate_and_link+0x46/0xc5
[<ffffffff802d304b>] keyring_alloc+0x46/0x5e
[<ffffffff803f51e1>] thread_return+0x0/0x130
[<ffffffff802d489c>] alloc_uid_keyring+0x3d/0xa6
[<ffffffff80279f24>] kmem_cache_alloc+0x1a/0xc4
[<ffffffff8023861c>] alloc_uid+0xfc/0x1c8
[<ffffffff8023c21d>] set_user+0xf/0x97
[<ffffffff8023dc20>] sys_setresuid+0x15e/0x245
[<ffffffff8020a518>] system_call+0x68/0x6d
[<ffffffff8020a4b0>] system_call+0x0/0x6d
Se alguem tiver ideia resolver ficarei grato.