[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#804079: linux-image-3.16.0-4-amd64: Kernel panic on Xen virtualisation in Debian



Hi,

we experienced this bug again today and a few weeks ago.
(Jan Prunk, who opened this bug, works with us on this issue)

we were running Xen 4.4.4 and Debians linux-image-amd64
3.16.7-ckt20-1+deb8u4 during both crashes.
now we updated to 3.16.7-ckt25-2, but i doubt this will help, as Ingo
already wrote in May he had the same issue with Kernel 4.5 (from backports).

please find attached the kernel panic output we obtained via the serial
console - lucky we have one.

I would be very pleased if someone may have ideas on how to handle this
- other than disabling IPv6, that is no solution.

Regards

Andreas
[3234866.294182] BUG: unable to handle kernel paging request at ffff8801cdca6000
[3234866.416948] IP: [<ffffffff812b79dd>] memcpy+0xd/0x110
[3234866.536483] PGD 1814067 PUD 2007fe067 PMD 20078f067 PTE 0
[3234866.654585] Oops: 0000 [#1] SMP
[3234866.770799] Modules linked in: cpuid xt_set ip_set_hash_ip ip_set nfnetlink xt_LOG xt_limit xt_physdev xen_acpi_processor xen_pciback xen_netback xen_blkback xen_gntalloc xen_gntdev xen_evtchn xenfs xen_privcmd openvswitch gre vxlan crc32c_generic xt_multiport ip6table_filter ip6_tables ipt_REJECT xt_tcpudp iptable_filter ip_tables x_tables ext4 crc16 mbcache jbd2 jc42 fuse intel_powerclamp coretemp iTCO_wdt iTCO_vendor_support ipmi_devintf evdev crc32_pclmul aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd ttm cdc_ether drm_kms_helper usbnet mii psmouse serio_raw pcspkr i2c_i801 drm lpc_ich mfd_core i2c_algo_bit i2c_core ioatdma i7core_edac ipmi_si dca edac_core tpm_tis tpm ipmi_msghandler button processor shpchp thermal_sys xfs libcrc32c raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx raid1 usbhid hid ohci_hcd btrfs xor raid6_pq dm_mod ata_generic md_mod xen_blkfront sg sd_mod crc_t10dif crct10dif_generic ata_piix crct10dif_pclmul crct10dif_common crc32c_intel libata ehci_pci uhci_hcd ehci_hcd megaraid_sas scsi_mod usbcore usb_common e1000e ptp pps_core bnx2
[3234867.831594] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 3.16.0-4-amd64 #1 Debian 3.16.7-ckt20-1+deb8u4
[3234867.948071] Hardware name: IBM System x3550 M3 -[7944F2G]-/69Y4438, BIOS -[D6E159AUS-1.17]- 05/02/2013
[3234868.064043] task: ffffffff8181a460 ti: ffffffff81800000 task.ti: ffffffff81800000
[3234868.178996] RIP: e030:[<ffffffff812b79dd>]  [<ffffffff812b79dd>] memcpy+0xd/0x110
[3234868.292852] RSP: e02b:ffff8801fee03cf8  EFLAGS: 00010246
[3234868.404840] RAX: ffff88005a465070 RBX: ffff8801c70e5500 RCX: 000000000000005e
[3234868.516185] RDX: 0000000000000000 RSI: ffff8801cdca5ffe RDI: ffff88005a465220
[3234868.625952] RBP: ffff8801fee03dd8 R08: 00000000000006c0 R09: ffff88005a465062
[3234868.734095] R10: 6001000000000000 R11: 0000000093c8ec00 R12: ffff88005b021d00
[3234868.840953] R13: ffff8801cdca5e66 R14: ffff88006d1c1380 R15: 00000000000004a8
[3234868.946025] FS:  00007fac3fcc3700(0000) GS:ffff8801fee00000(0000) knlGS:0000000000000000
[3234869.050334] CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[3234869.152920] CR2: ffff8801cdca6000 CR3: 000000000205c000 CR4: 0000000000002660
[3234869.254725] Stack:
[3234869.353913]  ffffffff814d32df ffff8801ef648400 ffff8801fee03d48 0010340008160120
[3234869.453612]  3101000000000000 ffffffff814f000a 000000048181a460 00000000000080fe
[3234869.551878]  0d38a2feff9eae64 0000000000000000 83561e39290000aa ffff8801f05f6880
[3234869.648969] Call Trace:
[3234869.743520]  <IRQ>
[3234869.744138]  [<ffffffff814d32df>] ? ndisc_send_redirect+0x3bf/0x410
[3234869.928366]  [<ffffffff814f000a>] ? xfrm6_output+0x2a/0x70
[3234870.018528]  [<ffffffff814bc20c>] ? ip6_forward+0x71c/0x850
[3234870.106851]  [<ffffffff814c9904>] ? ip6_route_input+0xa4/0xd0
[3234870.193372]  [<ffffffff8141ed93>] ? __netif_receive_skb_core+0x543/0x750
[3234870.278512]  [<ffffffff8141fbb5>] ? process_backlog+0x95/0x160
[3234870.361788]  [<ffffffff8141f3a0>] ? net_rx_action+0x140/0x240
[3234870.443191]  [<ffffffff8106c681>] ? __do_softirq+0xf1/0x290
[3234870.522774]  [<ffffffff8106ca55>] ? irq_exit+0x95/0xa0
[3234870.600396]  [<ffffffff81359e85>] ? xen_evtchn_do_upcall+0x35/0x50
[3234870.676685]  [<ffffffff81515b5e>] ? xen_do_hypervisor_callback+0x1e/0x30
[3234870.751435]  <EOI>
[3234870.752053]  [<ffffffff810013aa>] ? xen_hypercall_sched_op+0xa/0x20
[3234870.896060]  [<ffffffff810013aa>] ? xen_hypercall_sched_op+0xa/0x20
[3234870.965651]  [<ffffffff81009e7c>] ? xen_safe_halt+0xc/0x20
[3234871.033199]  [<ffffffff8101c8c9>] ? default_idle+0x19/0xb0
[3234871.099205]  [<ffffffff810a8120>] ? cpu_startup_entry+0x340/0x400
[3234871.164843]  [<ffffffff81903076>] ? start_kernel+0x497/0x4a2
[3234871.230237]  [<ffffffff81902a04>] ? set_init_arg+0x4e/0x4e
[3234871.295272]  [<ffffffff81904f69>] ? xen_start_kernel+0x569/0x573
[3234871.358951] Code: 66 0f 1f 44 00 00 e8 03 fc ff ff 48 8b 43 58 48 2b 43 50 88 43 4e eb e6 90 90 90 90 90 90 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 <f3> 48 a5 89 d1 f3 a4 c3 20 4c 8b 06 4c 8b 4e 08 4c 8b 56 10 4c
[3234871.487876] RIP  [<ffffffff812b79dd>] memcpy+0xd/0x110
[3234871.549034]  RSP <ffff8801fee03cf8>
[3234871.608074] CR2: ffff8801cdca6000
[3234871.791925] ---[ end trace c7bfc78a76e6c989 ]---
[3234871.847551] Kernel panic - not syncing: Fatal exception in interrupt
[3234871.902395] Kernel Offset: 0x0 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffff9fffffff)

Reply to: