[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#746325: marked as done (linux-image-3.14-trunk-amd64: Kernel panic running Xen)



Your message dated Sat, 24 Apr 2021 23:12:14 +0200
with message-id <E1laPZC-001KDO-Dk@hullmann.westfalen.local>
and subject line Closing this bug
has caused the Debian Bug report #746325,
regarding linux-image-3.14-trunk-amd64: Kernel panic running Xen
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
746325: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746325
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-3.14-trunk-amd64
Version: 3.14.1-1~exp1
Severity: important

Below is the kernel message log from a panic when running Xen.  Because of this
I had to move back to an earlier kernel.  On the same server kernel 3.12.9-1
has worked well for me and I'm now trying 3.13.10-1.

Apr 29 09:16:37 server kernel: [37476.538497] ------------[ cut here ]------------
Apr 29 09:16:37 server kernel: [37476.542437] kernel BUG at /build/linux-U5grk0/linux-3.14.1/drivers/net/xen-netback/netback.c:540!
Apr 29 09:16:37 server kernel: [37476.542437] invalid opcode: 0000 [#1] SMP 
Apr 29 09:16:37 server kernel: [37476.542437] Modules linked in: fuse ufs qnx4 hfsplus hfs minix ntfs vfat msdos fat jfs xfs libcrc32c reiserfs dm_mod xt_mark iptable_mangle cls_fw sch_sfq sch_htb xt_physdev xen_blkback xen_netback ppp_deflate bsd_comp xen_gntdev xen_evtchn xenfs xen_privcmd ppp_async crc_ccitt ppp_generic slhc ipt_MASQUERADE xt_nat iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack xt_tcpudp ipt_REJECT xt_LOG iptable_filter ip_tables x_tables nfsd auth_rpcgss oid_registry nfs_acl nfs bridge lockd stp fscache llc sunrpc ext4 crc16 mbcache jbd2 radeon ttm drm_kms_helper drm dcdbas tpm_tis i2c_algo_bit joydev tpm shpchp k8temp pcspkr evdev amd64_edac_mod edac_mce_amd edac_core processor thermal_sys button i2c_nforce2 i2c_core serio_raw loop autofs4 crc32c btrfs xor raid6_pq raid1 md_mod sr_mod cdrom sg hid_generic sd_mod crc_t10dif crct10dif_common ata_generic usbhid hid e100 mii tg3 ptp pps_core libphy sata_nv ehci_pci ohci_pci ohci_hcd ehci_
 hcd libata scsi_mod usbcore u
Apr 29 09:16:37 server kernel: sb_common
Apr 29 09:16:37 server kernel: [37476.542437] CPU: 1 PID: 3720 Comm: vif3.1 Not tainted 3.14-trunk-amd64 #1 Debian 3.14.1-1~exp1
Apr 29 09:16:37 server kernel: [37476.542437] Hardware name: Dell Inc. PowerEdge T105 /0RR825, BIOS 1.2.1 06/13/2008
Apr 29 09:16:37 server kernel: [37476.542437] task: ffff88011cce5630 ti: ffff8800abc7c000 task.ti: ffff8800abc7c000
Apr 29 09:16:37 server kernel: [37476.542437] RIP: e030:[<ffffffffa06e8c36>]  [<ffffffffa06e8c36>] xenvif_rx_action+0x836/0x840 [xen_netback]
Apr 29 09:16:37 server kernel: [37476.542437] RSP: e02b:ffff8800abc7ddd8  EFLAGS: 00010297
Apr 29 09:16:37 server kernel: [37476.542437] RAX: 0000000000000000 RBX: ffff88011ca50880 RCX: 0000000000000001
Apr 29 09:16:37 server kernel: [37476.542437] RDX: 0000000000000013 RSI: ffff88011038a1a8 RDI: 00000000001f5000
Apr 29 09:16:37 server kernel: [37476.542437] RBP: 000000000006d32c R08: ffff8800abc7ddfc R09: 0000160000000000
Apr 29 09:16:37 server kernel: [37476.542437] R10: ffff88011ca50880 R11: ffff8800bd02f000 R12: ffff8800abc7ddfc
Apr 29 09:16:37 server kernel: [37476.542437] R13: 0000000000000011 R14: ffff88011038a1a8 R15: ffff88011ca50880
Apr 29 09:16:37 server kernel: [37476.542437] FS:  00007f0f86162700(0000) GS:ffff88012a900000(0000) knlGS:0000000000000000
Apr 29 09:16:37 server kernel: [37476.542437] CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
Apr 29 09:16:37 server kernel: [37476.542437] CR2: ffffffffff600400 CR3: 00000000a24fe000 CR4: 0000000000000660
Apr 29 09:16:37 server kernel: [37476.542437] Stack:
Apr 29 09:16:37 server kernel: [37476.542437]  ffff8800abc7ddfc 0000000000000012 0006d32c00000011 ffff88011ca573a0
Apr 29 09:16:37 server kernel: [37476.542437]  000000002a914340 ffff8800abc7de00 ffff8800abc7de00 ffff8800abc7de10
Apr 29 09:16:37 server kernel: [37476.542437]  ffff8800abc7de10 0000000000000000 0000000000000012 0000000000000012
Apr 29 09:16:37 server kernel: [37476.542437] Call Trace:
Apr 29 09:16:37 server kernel: [37476.542437]  [<ffffffffa06e9674>] ? xenvif_kthread+0x94/0x200 [xen_netback]
Apr 29 09:16:37 server kernel: [37476.542437]  [<ffffffff8109e400>] ? prepare_to_wait_event+0xf0/0xf0
Apr 29 09:16:37 server kernel: [37476.542437]  [<ffffffffa06e95e0>] ? xenvif_stop_queue+0x60/0x60 [xen_netback]
Apr 29 09:16:37 server kernel: [37476.542437]  [<ffffffff8107f911>] ? kthread+0xc1/0xe0
Apr 29 09:16:37 server kernel: [37476.542437]  [<ffffffff8107f850>] ? kthread_create_on_node+0x180/0x180
Apr 29 09:16:37 server kernel: [37476.542437]  [<ffffffff814bfc8c>] ? ret_from_fork+0x7c/0xb0
Apr 29 09:16:37 server kernel: [37476.542437]  [<ffffffff8107f850>] ? kthread_create_on_node+0x180/0x180
Apr 29 09:16:37 server kernel: [37476.542437] Code: 00 00 00 e9 96 fa ff ff c6 44 24 08 00 e9 38 fc ff ff 83 c8 03 e9 cd fd ff ff 45 31 c0 b8 04 00 00 00 e9 a5 fd ff ff 0f 0b 0f 0b <0f> 0b 0f 1f 84 00 00 00 00 00 48 8b 97 18 6b 00 00 8b 02 eb 1d 
Apr 29 09:16:37 server kernel: [37476.542437] RIP  [<ffffffffa06e8c36>] xenvif_rx_action+0x836/0x840 [xen_netback]
Apr 29 09:16:37 server kernel: [37476.542437]  RSP <ffff8800abc7ddd8>
Apr 29 09:16:37 server kernel: [37477.183225] ---[ end trace a816ed8591f41b70 ]---
Apr 29 09:41:04 server kernel: [38943.412602] BUG: unable to handle kernel NULL pointer dereference at           (null)
Apr 29 09:41:04 server kernel: [38943.416551] IP: [<ffffffff81084752>] exit_creds+0x12/0x60
Apr 29 09:41:04 server kernel: [38943.416551] PGD 0 
Apr 29 09:41:04 server kernel: [38943.416551] Oops: 0000 [#2] SMP 
Apr 29 09:41:04 server kernel: [38943.416551] Modules linked in: fuse ufs qnx4 hfsplus hfs minix ntfs vfat msdos fat jfs xfs libcrc32c reiserfs dm_mod xt_mark iptable_mangle cls_fw sch_sfq sch_htb xt_physdev xen_blkback xen_netback ppp_deflate bsd_comp xen_gntdev xen_evtchn xenfs xen_privcmd ppp_async crc_ccitt ppp_generic slhc ipt_MASQUERADE xt_nat iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack xt_tcpudp ipt_REJECT xt_LOG iptable_filter ip_tables x_tables nfsd auth_rpcgss oid_registry nfs_acl nfs bridge lockd stp fscache llc sunrpc ext4 crc16 mbcache jbd2 radeon ttm drm_kms_helper drm dcdbas tpm_tis i2c_algo_bit joydev tpm shpchp k8temp pcspkr evdev amd64_edac_mod edac_mce_amd edac_core processor thermal_sys button i2c_nforce2 i2c_core serio_raw loop autofs4 crc32c btrfs xor raid6_pq raid1 md_mod sr_mod cdrom sg hid_generic sd_mod crc_t10dif crct10dif_common ata_generic usbhid hid e100 mii tg3 ptp pps_core libphy sata_nv ehci_pci ohci_pci ohci_hcd ehci_
 hcd libata scsi_mod usbcore u
Apr 29 09:41:04 server kernel: sb_common
Apr 29 09:41:04 server kernel: [38943.416551] CPU: 1 PID: 19 Comm: xenwatch Tainted: G      D      3.14-trunk-amd64 #1 Debian 3.14.1-1~exp1
Apr 29 09:41:04 server kernel: [38943.416551] Hardware name: Dell Inc. PowerEdge T105 /0RR825, BIOS 1.2.1 06/13/2008
Apr 29 09:41:04 server kernel: [38943.416551] task: ffff88011e136150 ti: ffff88011e1f6000 task.ti: ffff88011e1f6000
Apr 29 09:41:04 server kernel: [38943.416551] RIP: e030:[<ffffffff81084752>]  [<ffffffff81084752>] exit_creds+0x12/0x60
Apr 29 09:41:04 server kernel: [38943.416551] RSP: e02b:ffff88011e1f7db8  EFLAGS: 00010292
Apr 29 09:41:04 server kernel: [38943.416551] RAX: 0000000000000000 RBX: ffff88011cce5630 RCX: 0000000000000000
Apr 29 09:41:04 server kernel: [38943.416551] RDX: ffffffff81859240 RSI: ffff88011cce5630 RDI: 0000000000000000
Apr 29 09:41:04 server kernel: [38943.416551] RBP: ffff88011cce5630 R08: ffff88011b670e00 R09: ffff880117e2f8e0
Apr 29 09:41:04 server kernel: [38943.416551] R10: 000000000000000f R11: f000000000000000 R12: 0000000000000000
Apr 29 09:41:04 server kernel: [38943.416551] R13: ffff88011b6b46c0 R14: 0000000000000000 R15: 0000000000000000
Apr 29 09:41:04 server kernel: [38943.416551] FS:  00007f3c03347700(0000) GS:ffff88012a900000(0000) knlGS:0000000000000000
Apr 29 09:41:04 server kernel: [38943.416551] CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
Apr 29 09:41:04 server kernel: [38943.416551] CR2: 0000000000000000 CR3: 0000000004286000 CR4: 0000000000000660
Apr 29 09:41:04 server kernel: [38943.416551] Stack:
Apr 29 09:41:04 server kernel: [38943.416551]  ffff88011cce5630 ffffffff8105c0f0 0000000000000000 ffff88011cce5630
Apr 29 09:41:04 server kernel: [38943.416551]  ffffffff8107fbb8 ffff88011ca50880 0000000000000003 0000000000000000
Apr 29 09:41:04 server kernel: [38943.416551]  ffffffffa06eb174 0000000000000005 ffffffffa06e9a5b ffffffff8173176c
Apr 29 09:41:04 server kernel: [38943.416551] Call Trace:
Apr 29 09:41:04 server kernel: [38943.416551]  [<ffffffff8105c0f0>] ? __put_task_struct+0x40/0x120
Apr 29 09:41:04 server kernel: [38943.416551]  [<ffffffff8107fbb8>] ? kthread_stop+0xc8/0xd0
Apr 29 09:41:04 server kernel: [38943.416551]  [<ffffffffa06eb174>] ? xenvif_disconnect+0x24/0x80 [xen_netback]
Apr 29 09:41:04 server kernel: [38943.416551]  [<ffffffffa06e9a5b>] ? set_backend_state+0x10b/0x910 [xen_netback]
Apr 29 09:41:04 server kernel: [38943.416551]  [<ffffffff8131dab6>] ? xenbus_read_driver_state+0x26/0x40
Apr 29 09:41:04 server kernel: [38943.416551]  [<ffffffff8131f220>] ? unregister_xenbus_watch+0x200/0x200
Apr 29 09:41:04 server kernel: [38943.416551]  [<ffffffff8131f2b0>] ? xenwatch_thread+0x90/0x130
Apr 29 09:41:04 server kernel: [38943.416551]  [<ffffffff8109e400>] ? prepare_to_wait_event+0xf0/0xf0
Apr 29 09:41:04 server kernel: [38943.416551]  [<ffffffff8107f911>] ? kthread+0xc1/0xe0
Apr 29 09:41:04 server kernel: [38943.416551]  [<ffffffff8107f850>] ? kthread_create_on_node+0x180/0x180
Apr 29 09:41:04 server kernel: [38943.416551]  [<ffffffff814bfc8c>] ? ret_from_fork+0x7c/0xb0
Apr 29 09:41:04 server kernel: [38943.416551]  [<ffffffff8107f850>] ? kthread_create_on_node+0x180/0x180
Apr 29 09:41:04 server kernel: [38943.416551] Code: ff ff 85 c0 0f 84 64 fe ff ff e9 3b fe ff ff 66 2e 0f 1f 84 00 00 00 00 00 53 48 8b 87 a8 04 00 00 48 89 fb 48 8b bf a0 04 00 00 <8b> 00 48 c7 83 a0 04 00 00 00 00 00 00 f0 ff 0f 74 1c 48 8b bb 
Apr 29 09:41:04 server kernel: [38943.416551] RIP  [<ffffffff81084752>] exit_creds+0x12/0x60
Apr 29 09:41:04 server kernel: [38943.416551]  RSP <ffff88011e1f7db8>
Apr 29 09:41:04 server kernel: [38943.416551] CR2: 0000000000000000
Apr 29 09:41:04 server kernel: [38943.416551] ---[ end trace a816ed8591f41b71 ]---
Apr 29 09:41:04 server kernel: [38944.242208] xenbr1: port 2(vif3.1) entered disabled state
-- System Information:
Debian Release: 7.5
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.13-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages linux-image-3.14-trunk-amd64 depends on:
ii  debconf [debconf-2.0]                   1.5.49
ii  initramfs-tools [linux-initramfs-tool]  0.115
ii  kmod                                    9-3
ii  linux-base                              3.5
ii  module-init-tools                       9-3

Versions of packages linux-image-3.14-trunk-amd64 recommends:
pn  firmware-linux-free  <none>

Versions of packages linux-image-3.14-trunk-amd64 suggests:
pn  debian-kernel-handbook  <none>
ii  grub-pc                 1.99-27+deb7u2
pn  linux-doc-3.14          <none>

--- End Message ---
--- Begin Message ---
This bug was filed for a very old kernel. If you can reproduce it with
- the current version in unstable/testing
- the latest kernel from buster.backports
please reopen the bug, see https://www.debian.org/Bugs/server-control

--- End Message ---

Reply to: