[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#566312: marked as done (BUG: unable to handle kernel paging request, in skb_copy_bits)

Your message dated Sun, 1 Aug 2010 21:12:18 -0400
with message-id <20100802011218.GA1543@galadriel.inutil.org>
and subject line Re: BUG: unable to handle kernel paging request, in skb_copy_bits
has caused the Debian Bug report #566312,
regarding BUG: unable to handle kernel paging request, in skb_copy_bits
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org

566312: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566312
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-2.6.26-2-686-bigmem
Version: 2.6.26-19lenny2
Severity: normal

One of our i386 KVM VMs has been crashing every couple of days, with the
following oops output.

linux-image-2.6.30-2-686-bigmem=2.6.30-8 (from squeeze) made no difference,
but linux-image-2.6.32-trunk-686-bigmem=2.6.32-5 from unstable has gone
without a crash for over a week now.

BUG: unable to handle kernel paging request at fffb8000
IP: [<c0263c36>] skb_copy_bits+0x55/0x20d
Oops: 0002 [#1] SMP
Modules linked in: ipt_LOG xt_limit ipt_REJECT nf_conntrack_ipv4 xt_state nf_conntrack_ftp nf_conntrack xt_tcpudp iptable_filter ip_tables x_tables nfsd auth_rpcgss exportfs nfs lockd nfs_acl sunrpc ipv6 loop evdev virtio_balloon virtio_net psmouse pcspkr i2c_piix4 i2c_core button ext3 jbd mbcache virtio_blk ide_cd_mod cdrom ide_pci_generic floppy virtio_pci virtio_ring virtio uhci_hcd usbcore piix ide_core ata_generic libata scsi_mod dock thermal processor fan thermal_sys [last unloaded: scsi_wait_scan]

Pid: 24440, comm: netstats-script Not tainted (2.6.26-2-686-bigmem #1)
EIP: 0060:[<c0263c36>] EFLAGS: 00010282 CPU: 0
EIP is at skb_copy_bits+0x55/0x20d
EAX: 00000524 EBX: f40cfc04 ECX: 00000149 EDX: f6dbd080
ESI: f58a68d6 EDI: fffb8000 EBP: fffb8000 ESP: f40cfb8c
DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068
Process netstats-script (pid: 24440, ti=f40ce000 task=f44e3b40 task.ti=f40ce000)
Stack: 00000000 00000084 f6dbd080 000005dc 000005a8 00000008 f40cfc04 00000524 00001000 fffb8000 f8baf02f 00000524 00000000 00001000 f8baeeb7 f40cfc04 f585408c f7fff6e4 0000007c 0000107c f40cfc04 000005a0 f5993800 f8bb04b1
Call Trace:
[<f8baf02f>] xdr_skb_read_bits+0x1c/0x30 [sunrpc]
[<f8baeeb7>] xdr_partial_copy_from_skb+0x11f/0x179 [sunrpc]
[<f8bb04b1>] xs_tcp_data_recv+0x238/0x3c6 [sunrpc]
[<f8baf013>] xdr_skb_read_bits+0x0/0x30 [sunrpc]
[<c028b446>] tcp_read_sock+0xa2/0x1ef
[<f8bb0279>] xs_tcp_data_recv+0x0/0x3c6 [sunrpc]
[<f8bb0f15>] xs_tcp_data_ready+0x52/0x62 [sunrpc]
[<c0130b3b>] mod_timer+0x19/0x36
[<c0261337>] sk_reset_timer+0xc/0x16
[<c0293b10>] tcp_rcv_established+0x3b3/0x637
[<c0298b80>] tcp_v4_do_rcv+0x262/0x3e8
[<c029a866>] tcp_v4_rcv+0x545/0x597
[<c0283167>] ip_local_deliver_finish+0xe8/0x183
[<c0283062>] ip_rcv_finish+0x286/0x2a3
[<c0268819>] netif_receive_skb+0x31c/0x349
[<f88fa9f3>] virtnet_poll+0x167/0x258 [virtio_net]
[<c026a733>] net_rx_action+0x9c/0x177
[<c012d125>] __do_softirq+0x66/0xd3
[<c012d1d7>] do_softirq+0x45/0x53
[<c012d48e>] irq_exit+0x35/0x67
[<c010afd7>] do_IRQ+0x52/0x63
[<c01092a7>] common_interrupt+0x23/0x28
[<c0119e25>] kvm_leave_lazy_mmu+0x29/0x31
[<c016a091>] unmap_vmas+0x57a/0x7c4
[<c017e27e>] do_sync_read+0xbf/0xfe
[<c016e306>] exit_mmap+0x65/0xd1
[<c012727e>] mmput+0x20/0x7e
[<c0182314>] flush_old_exec+0x3e5/0x677
[<c0181a02>] kernel_read+0x32/0x43
[<c01a5138>] load_elf_binary+0x310/0x108a
[<c0168394>] page_address+0x73/0x93
[<c016852e>] kmap_high+0x1c/0x1a2
[<c0168394>] page_address+0x73/0x93
[<c0181726>] copy_strings+0x169/0x173
[<c01817eb>] search_binary_handler+0x8f/0x1a4
[<c0182926>] do_execve+0x138/0x1c6
[<c010713b>] sys_execve+0x2a/0x4a
[<c01088ce>] syscall_call+0x7/0xb
[<c02c0000>] xenfb_probe+0x221/0x35b
Code: d0 2b 44 24 04 89 54 24 10 85 c0 7e 39 39 44 24 2c 89 ef 0f 4e 44 24 2c 8b 54 24 08 8b 74 24 04 89 c1 c1 e9 02 03 b2 a4 00 00 00 <f3> a5 89 c1 83 e1 03 74 02 f3 a4 29 44 24 2c 0f 84 92 01 00 00
EIP: [<c0263c36>] skb_copy_bits+0x55/0x20d SS:ESP 0068:f40cfb8c
Kernel panic - not syncing: Fatal exception in interrupt

-- Package-specific info:

-- System Information:
Debian Release: 5.0.3
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-trunk-686-bigmem (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages linux-image-2.6.26-2-686-bigmem depends on:
ii  debconf [debconf-2.0]         1.5.24     Debian configuration management sy
ii  initramfs-tools [linux-initra 0.92o      tools for generating an initramfs
ii  module-init-tools             3.4-1      tools for managing Linux kernel mo

Versions of packages linux-image-2.6.26-2-686-bigmem recommends:
ii  libc6-i686                    2.7-18     GNU C Library: Shared libraries [i

Versions of packages linux-image-2.6.26-2-686-bigmem suggests:
ii  grub                       0.97-47lenny2 GRand Unified Bootloader (Legacy v
pn  linux-doc-2.6.26           <none>        (no description available)

-- debconf information:
  linux-image-2.6.26-2-686-bigmem/preinst/overwriting-modules-2.6.26-2-686-bigmem: true
  shared/kernel-image/really-run-bootloader: true
  linux-image-2.6.26-2-686-bigmem/postinst/depmod-error-2.6.26-2-686-bigmem: false
  linux-image-2.6.26-2-686-bigmem/preinst/bootloader-initrd-2.6.26-2-686-bigmem: true
  linux-image-2.6.26-2-686-bigmem/postinst/depmod-error-initrd-2.6.26-2-686-bigmem: false
  linux-image-2.6.26-2-686-bigmem/postinst/create-kimage-link-2.6.26-2-686-bigmem: true
  linux-image-2.6.26-2-686-bigmem/preinst/lilo-initrd-2.6.26-2-686-bigmem: true
  linux-image-2.6.26-2-686-bigmem/prerm/would-invalidate-boot-loader-2.6.26-2-686-bigmem: true
  linux-image-2.6.26-2-686-bigmem/prerm/removing-running-kernel-2.6.26-2-686-bigmem: true
  linux-image-2.6.26-2-686-bigmem/postinst/old-dir-initrd-link-2.6.26-2-686-bigmem: true
  linux-image-2.6.26-2-686-bigmem/preinst/elilo-initrd-2.6.26-2-686-bigmem: true
  linux-image-2.6.26-2-686-bigmem/postinst/old-initrd-link-2.6.26-2-686-bigmem: true
  linux-image-2.6.26-2-686-bigmem/postinst/old-system-map-link-2.6.26-2-686-bigmem: true

--- End Message ---
--- Begin Message ---
Version: 2.6.32-1

On Sun, Aug 01, 2010 at 09:02:29PM -0400, John Morrissey wrote:
> On Sun, Aug 01, 2010 at 05:48:53PM -0400, Moritz Muehlenhoff wrote:
> > On Fri, Jan 22, 2010 at 03:36:23PM -0500, John Morrissey wrote:
> > > linux-image-2.6.30-2-686-bigmem=2.6.30-8 (from squeeze) made no
> > > difference, but linux-image-2.6.32-trunk-686-bigmem=2.6.32-5 from
> > > unstable has gone without a crash for over a week now.
> > 
> > The next release of Debian (6.0, code name Squeeze) will be based
> > on 2.6.32. 
> > 
> > Has the 2.6.32 persisted to not show the bug in question?
> Yes.

Closing the bug, then.


--- End Message ---

Reply to: