FAQ Search Today's Posts Mark Forums Read
» Video Reviews

» Linux Archive

Linux-archive is a website aiming to archive linux email lists and to make them easily accessible for linux users/developers.


» Sponsor

» Partners

» Sponsor

Go Back   Linux Archive > Debian > Debian Kernel

 
 
LinkBack Thread Tools
 
Old 09-19-2011, 09:22 PM
Jonathan Nieder
 
Default Bug#642154: BUG: unable to handle kernel paging request at ffff8803bb6ad000

Hi,

rush wrote:

> I have some suspicious activities on my server: i've continiously repeated
> messages in dmesg about "BUG: unable to handle kernel paging request"

Yes, if this server is open to the public (especially if it has
untrusted local users), you should probably take it down. A kernel
BUG means that something happened the kernel did not expect, and after
that point, all bets (including security bets) are off.

Of course we would be happiest if you can make it happen again, in
order to track it down and fix it, though.

[...]
> I've checked memory: they are fine

Thanks!

[...]
> * Kernel has oopsed before.
[...]
> [430009.960980] RIP [<ffffffff810106db>] __sanitize_i387_state+0x23/0xe1

Can you recover a trace of the first oops (for example from
/var/log/message*)? Instead of a "Tainted" line containing a "D" (has
oopsed before), it should have a "Not tainted" line.

Thanks for writing,
Jonathan



--
To UNSUBSCRIBE, email to debian-kernel-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: 20110919212211.GB6343@elie">http://lists.debian.org/20110919212211.GB6343@elie
 
Old 09-19-2011, 10:00 PM
rush
 
Default Bug#642154: BUG: unable to handle kernel paging request at ffff8803bb6ad000

Package: linux-2.6
Version: 3.0.0-3
Severity: important
Tags: upstream

Dear Maintainer,

I have some suspicious activities on my server: i've continiously repeated messages in dmesg about "BUG: unable to handle kernel paging request", also there are many messages like

Message from syslogd@xen-dom0 at Sep 20 00:45:04 ...
kernel:[430010.207876] Oops: 0000 [#3453] SMP

Message from syslogd@xen-dom0 at Sep 20 00:45:04 ...
kernel:[430010.213958] Stack:

Message from syslogd@xen-dom0 at Sep 20 00:45:04 ...
kernel:[430010.215212] Call Trace:

Message from syslogd@xen-dom0 at Sep 20 00:45:04 ...
kernel:[430010.215745] Code: e8 13 2a ff ff 66 90 c3 48 8b 97 48 04 00 00 48 85 d2 0f 84 d0 00 00 00 48 8b 47 08 f6 40 14 01 74 02 0f 0b 48 8b 05 45 4e 71 00

Message from syslogd@xen-dom0 at Sep 20 00:45:04 ...
kernel:[430010.220251] CR2: ffff8803bbe85000

falling down in console or ssh session.

I've checked memory: they are fine (also they are new, just a week from a shop). I tried to reboot several times without any effect.

Also there is xen on this machine
ii libxenstore3.0 4.1.1-2 Xenstore communications library for Xen
ii xen-hypervisor-4.0-amd64 4.0.1-2 The Xen Hypervisor on AMD64
ii xen-linux-system-3.0.0-1-amd64 3.0.0-3 Xen system with Linux 3.0.0 on 64-bit PCs (meta-package)
ii xen-qemu-dm-4.0 4.0.1-2 Xen Qemu Device Model virtual machine hardware emulator
ii xen-tools 4.2.1-1 Tools to manage Xen virtual servers
ii xen-utils-4.0 4.0.1-2 XEN administrative tools
ii xen-utils-common 4.1.0~rc6-1 XEN administrative tools - common files
ii xenstore-utils 4.1.1-2 Xenstore utilities for Xen

It can take some influence on this messages?

Is it serious and my server in dangerous? How i make fix it or at least turn off messages in console and ssh session?
By the way, munin monitoring sometimes show blank spaces in graphics when quering xen time. But xen virtual machine works fine without any problems.

Please help me =)


-- Package-specific info:
** Version:
Linux version 3.0.0-1-amd64 (Debian 3.0.0-3) (ben@decadent.org.uk) (gcc version 4.5.3 (Debian 4.5.3-8) ) #1 SMP Sat Aug 27 16:21:11 UTC 2011

** Command line:
placeholder root=/dev/mapper/xen-system ro quiet

** Tainted: D (128)
* Kernel has oopsed before.

** Kernel log:
[430009.942525] RSP: e02b:ffff88005895fe00 EFLAGS: 00010246
[430009.942630] RAX: 0000000000000000 RBX: 00007fff294b9380 RCX: 0000000000000200
[430009.942769] RDX: ffff8803bbf13e00 RSI: ffff88005895ffd8 RDI: ffff88005813b510
[430009.942905] RBP: ffff88005813b510 R08: ffff88005895e000 R09: ffffffff81684640
[430009.943044] R10: 0000000000012800 R11: 0000000000000246 R12: 0000000000000000
[430009.943179] R13: ffffffffffffffff R14: ffff88005813b510 R15: 00007fff294b9380
[430009.943321] FS: 00007f7d27518700(0000) GS:ffff8803d620c000(0000) knlGS:0000000000000000
[430009.943463] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[430009.943570] CR2: ffff8803bbf14000 CR3: 0000000214dd3000 CR4: 0000000000002660
[430009.943711] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[430009.943851] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[430009.943995] Process swap (pid: 2786, threadinfo ffff88005895e000, task ffff88005813b510)
[430009.944136] Stack:
[430009.944231] ffffffff81010919 0000000000413201 ffff88005895ff58 0000000000000011
[430009.944617] ffff88005813b9a0 ffffffffffffffff ffffffff81008fdd 0000000000000000
[430009.945001] 00007fff294b91b8 0000000000000011 0000000000040001 0000fffe00000ae3
[430009.945387] Call Trace:
[430009.945485] [<ffffffff81010919>] ? save_i387_xstate+0x102/0x1f3
[430009.945594] [<ffffffff81008fdd>] ? do_signal+0x212/0x649
[430009.945701] [<ffffffff81009450>] ? do_notify_resume+0x25/0x6b
[430009.945811] [<ffffffff810fbfa6>] ? sys_read+0x5f/0x6b
[430009.956650] [<ffffffff8133bfe0>] ? int_signal+0x12/0x17
[430009.956757] Code: e8 13 2a ff ff 66 90 c3 48 8b 97 48 04 00 00 48 85 d2 0f 84 d0 00 00 00 48 8b 47 08 f6 40 14 01 74 02 0f 0b 48 8b 05 45 4e 71 00
[430009.959514] 8b b2 00 02 00 00 48 89 c1 48 21 f1 48 39 c1 0f 84 a7 00 00
[430009.960980] RIP [<ffffffff810106db>] __sanitize_i387_state+0x23/0xe1
[430009.961151] RSP <ffff88005895fe00>
[430009.961251] CR2: ffff8803bbf14000
[430009.961350] ---[ end trace 35f1420b1560dba9 ]---
[430010.207109] BUG: unable to handle kernel paging request at ffff8803bbe85000
[430010.207350] IP: [<ffffffff810106db>] __sanitize_i387_state+0x23/0xe1
[430010.207525] PGD 1604067 PUD 3d82d9067 PMD 3d84b9067 PTE 0
[430010.207876] Oops: 0000 [#3453] SMP
[430010.208099] CPU 4
[430010.208166] Modules linked in: xt_tcpudp xt_physdev iptable_filter ip_tables x_tables xen_netback xen_blkback bridge stp xen_evtchn xenfs loop snd_pcm snd_timer snd soundcore evdev joydev snd_page_alloc i2c_i801 ghes pcspkr i2c_core button video processor hed ext4 mbcache jbd2 crc16 dm_mod raid1 md_mod usbhid hid sg sd_mod crc_t10dif ahci libahci libata scsi_mod fan thermal thermal_sys ehci_hcd usbcore e1000e [last unloaded: scsi_wait_scan]
[430010.211717]
[430010.211812] Pid: 2804, comm: uptime Tainted: G D 3.0.0-1-amd64 #1 Intel Corporation S1200BTL/S1200BTL
[430010.212142] RIP: e030:[<ffffffff810106db>] [<ffffffff810106db>] __sanitize_i387_state+0x23/0xe1
[430010.212348] RSP: e02b:ffff880006bc5e00 EFLAGS: 00010246
[430010.212452] RAX: 0000000000000000 RBX: 00007fff49bb94c0 RCX: 0000000000000200
[430010.212591] RDX: ffff8803bbe84e00 RSI: ffff880006bc5fd8 RDI: ffff88005812f160
[430010.212732] RBP: ffff88005812f160 R08: dead000000200200 R09: ffff8803bbcaafd8
[430010.212867] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000
[430010.213008] R13: ffffffffffffffff R14: ffff88005812f160 R15: 00007fff49bb94c0
[430010.213151] FS: 00007f1fe95a8700(0000) GS:ffff8803d61bb000(0000) knlGS:0000000000000000
[430010.213292] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[430010.213399] CR2: ffff8803bbe85000 CR3: 00000000749b3000 CR4: 0000000000002660
[430010.213538] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[430010.213677] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[430010.213816] Process uptime (pid: 2804, threadinfo ffff880006bc4000, task ffff88005812f160)
[430010.213958] Stack:
[430010.214052] ffffffff81010919 0000000000000001 ffff880006bc5f58 0000000000000011
[430010.214439] ffff88005812f5f0 ffffffffffffffff ffffffff81008fdd 00000000000002f5
[430010.214824] 00007fff49bb92f8 0000000000000011 0000000000040001 0000fffe00000af5
[430010.215212] Call Trace:
[430010.215311] [<ffffffff81010919>] ? save_i387_xstate+0x102/0x1f3
[430010.215421] [<ffffffff81008fdd>] ? do_signal+0x212/0x649
[430010.215529] [<ffffffff81009450>] ? do_notify_resume+0x25/0x6b
[430010.215639] [<ffffffff8133bfe0>] ? int_signal+0x12/0x17
[430010.215745] Code: e8 13 2a ff ff 66 90 c3 48 8b 97 48 04 00 00 48 85 d2 0f 84 d0 00 00 00 48 8b 47 08 f6 40 14 01 74 02 0f 0b 48 8b 05 45 4e 71 00
[430010.218499] 8b b2 00 02 00 00 48 89 c1 48 21 f1 48 39 c1 0f 84 a7 00 00
[430010.219978] RIP [<ffffffff810106db>] __sanitize_i387_state+0x23/0xe1
[430010.220151] RSP <ffff880006bc5e00>
[430010.220251] CR2: ffff8803bbe85000
[430010.220350] ---[ end trace 35f1420b1560dbaa ]---
[430011.720552] BUG: unable to handle kernel paging request at ffff8803bbf14000
[430011.720771] IP: [<ffffffff810106db>] __sanitize_i387_state+0x23/0xe1
[430011.720951] PGD 1604067 PUD 3d82d9067 PMD 3d84b9067 PTE 0
[430011.721287] Oops: 0000 [#3454] SMP
[430011.721508] CPU 6
[430011.721576] Modules linked in: xt_tcpudp xt_physdev iptable_filter ip_tables x_tables xen_netback xen_blkback bridge stp xen_evtchn xenfs loop snd_pcm snd_timer snd soundcore evdev joydev snd_page_alloc i2c_i801 ghes pcspkr i2c_core button video processor hed ext4 mbcache jbd2 crc16 dm_mod raid1 md_mod usbhid hid sg sd_mod crc_t10dif ahci libahci libata scsi_mod fan thermal thermal_sys ehci_hcd usbcore e1000e [last unloaded: scsi_wait_scan]
[430011.724894]
[430011.724980] Pid: 2851, comm: xen_cpu_percent Tainted: G D 3.0.0-1-amd64 #1 Intel Corporation S1200BTL/S1200BTL
[430011.725283] RIP: e030:[<ffffffff810106db>] [<ffffffff810106db>] __sanitize_i387_state+0x23/0xe1
[430011.725476] RSP: e02b:ffff880147e57e00 EFLAGS: 00010246
[430011.725574] RAX: 0000000000000000 RBX: 00007ffffaab3d00 RCX: 0000000000000200
[430011.725705] RDX: ffff8803bbf13e00 RSI: ffff880147e57fd8 RDI: ffff88005813b510
[430011.725833] RBP: ffff88005813b510 R08: dead000000200200 R09: ffff8803bd9ee698
[430011.725961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[430011.726090] R13: ffffffffffffffff R14: ffff88005813b510 R15: 00007ffffaab3d00
[430011.726224] FS: 00007fe41debf700(0000) GS:ffff8803d61f1000(0000) knlGS:0000000000000000
[430011.726355] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[430011.726453] CR2: ffff8803bbf14000 CR3: 0000000237c8e000 CR4: 0000000000002660
[430011.726580] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[430011.726708] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[430011.726837] Process xen_cpu_percent (pid: 2851, threadinfo ffff880147e56000, task ffff88005813b510)
[430011.726972] Stack:
[430011.727057] ffffffff81010919 0000000000000001 ffff880147e57f58 0000000000000011
[430011.727393] ffff88005813b9a0 ffffffffffffffff ffffffff81008fdd 0000000000000224
[430011.727731] 00007ffffaab3b38 0000000000000011 0000000000040001 0000000000000b24
[430011.728066] Call Trace:
[430011.728152] [<ffffffff81010919>] ? save_i387_xstate+0x102/0x1f3
[430011.728252] [<ffffffff81008fdd>] ? do_signal+0x212/0x649
[430011.728350] [<ffffffff81009450>] ? do_notify_resume+0x25/0x6b
[430011.728450] [<ffffffff8133bfe0>] ? int_signal+0x12/0x17
[430011.728547] Code: e8 13 2a ff ff 66 90 c3 48 8b 97 48 04 00 00 48 85 d2 0f 84 d0 00 00 00 48 8b 47 08 f6 40 14 01 74 02 0f 0b 48 8b 05 45 4e 71 00
[430011.730898] 8b b2 00 02 00 00 48 89 c1 48 21 f1 48 39 c1 0f 84 a7 00 00
[430011.732326] RIP [<ffffffff810106db>] __sanitize_i387_state+0x23/0xe1
[430011.732486] RSP <ffff880147e57e00>
[430011.732579] CR2: ffff8803bbf14000
[430011.732671] ---[ end trace 35f1420b1560dbab ]---

** Model information
sys_vendor: Intel Corporation
product_name: S1200BTL
product_version: ....................
chassis_vendor: ..............................
chassis_version: ..................
bios_vendor: Intel Corp.
bios_version: S1200BT.86B.01.00.0022.022820112240
board_vendor: Intel Corporation
board_name: S1200BTL
board_version: E98681-306

** Loaded modules:
Module Size Used by
xt_tcpudp 12570 2
xt_physdev 12515 8
iptable_filter 12536 1
ip_tables 22131 1 iptable_filter
x_tables 19024 4 xt_tcpudp,xt_physdev,iptable_filter,ip_tables
xen_netback 27130 0 [permanent]
xen_blkback 17971 0 [permanent]
bridge 66612 0
stp 12435 1 bridge
xen_evtchn 13009 3
xenfs 17714 1
loop 22711 8
snd_pcm 68104 0
snd_timer 22581 1 snd_pcm
snd 52823 2 snd_pcm,snd_timer
soundcore 13152 1 snd
evdev 17558 1
joydev 17262 0
snd_page_alloc 13043 1 snd_pcm
i2c_i801 16870 0
ghes 12988 0
pcspkr 12579 0
i2c_core 23909 1 i2c_i801
button 12930 0
video 17707 0
processor 27942 0
hed 12611 1 ghes
ext4 313917 4
mbcache 13066 1 ext4
jbd2 62574 1 ext4
crc16 12343 1 ext4
dm_mod 63164 15
raid1 26511 1
md_mod 83412 2 raid1
usbhid 40516 0
hid 73172 1 usbhid
sg 25985 0
sd_mod 36259 4
crc_t10dif 12348 1 sd_mod
ahci 25089 2
libahci 22767 1 ahci
libata 149043 2 ahci,libahci
scsi_mod 162442 3 sg,sd_mod,libata
fan 12674 0
thermal 17426 0
thermal_sys 17949 4 video,processor,fan,thermal
ehci_hcd 40090 0
usbcore 128338 3 usbhid,ehci_hcd
e1000e 124997 0

** Network interface configuration:

auto lo
iface lo inet loopback


auto eth1
iface eth1 inet static
address 195.14.104.58
netmask 255.255.254.0
gateway 195.14.104.1
nameserver 8.8.8.8

** Network status:
*** IP interfaces and addresses:
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: peth1: <BROADCAST,MULTICAST,PROMISC,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast master eth1 state UP qlen 1000
link/ether 00:1e:67:14:66:c9 brd ff:ff:ff:ff:ff:ff
inet6 fe80::21e:67ff:fe14:66c9/64 scope link
valid_lft forever preferred_lft forever
3: eth0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN qlen 1000
link/ether 00:1e:67:14:66:c8 brd ff:ff:ff:ff:ff:ff
4: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP
link/ether 00:1e:67:14:66:c9 brd ff:ff:ff:ff:ff:ff
inet 195.14.104.58/23 brd 195.14.105.255 scope global eth1
inet6 fe80::21e:67ff:fe14:66c9/64 scope link
valid_lft forever preferred_lft forever
5: vif4.0: <BROADCAST,MULTICAST,PROMISC,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast master eth1 state UP qlen 32
link/ether fe:ff:ff:ff:ff:ff brd ff:ff:ff:ff:ff:ff
inet6 fe80::fcff:ffff:feff:ffff/64 scope link
valid_lft forever preferred_lft forever
6: vif10.0: <BROADCAST,MULTICAST,PROMISC,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast master eth1 state UP qlen 32
link/ether fe:ff:ff:ff:ff:ff brd ff:ff:ff:ff:ff:ff
inet6 fe80::fcff:ffff:feff:ffff/64 scope link
valid_lft forever preferred_lft forever

*** Device statistics:
Inter-| Receive | Transmit
face |bytes packets errs drop fifo frame compressed multicast|bytes packets errs drop fifo colls carrier compressed
lo: 109850177 405560 0 0 0 0 0 0 109850177 405560 0 0 0 0 0 0
peth1: 20607170641 42773377 0 0 0 0 0 430825 57765477161 51101934 0 0 0 0 0 0
eth0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
eth1: 13253365107 6705804 0 0 0 0 0 0 765330415 4996333 0 0 0 0 0 0
vif4.0: 53633297551 21888528 0 0 0 0 0 0 6689816151 32092389 0 0 0 0 0 0
vif10.0: 1755233606 1153776 0 0 0 0 0 0 316314282 1579778 0 0 0 0 0 0

*** Protocol statistics:
Ip:
5827005 total packets received
0 forwarded
0 incoming packets discarded
5827005 incoming packets delivered
5385472 requests sent out
Icmp:
382 ICMP messages received
20 input ICMP message failed.
ICMP input histogram:
destination unreachable: 291
timeout in transit: 3
echo requests: 83
echo replies: 3
120 ICMP messages sent
0 ICMP messages failed
ICMP output histogram:
destination unreachable: 34
echo request: 3
echo replies: 83
IcmpMsg:
InType0: 3
InType3: 291
InType8: 83
InType11: 3
OutType0: 83
OutType3: 34
OutType8: 3
Tcp:
4677 active connections openings
15758 passive connection openings
193 failed connection attempts
6 connection resets received
4 connections established
5796763 segments received
5514915 segments send out
10873 segments retransmited
54 bad segments received.
4913 resets sent
Udp:
26393 packets received
34 packets to unknown port received.
0 packet receive errors
26425 packets sent
UdpLite:
TcpExt:
22 invalid SYN cookies received
33 resets received for embryonic SYN_RECV sockets
6937 TCP sockets finished time wait in fast timer
5 packets rejects in established connections because of timestamp
182265 delayed acks sent
28 delayed acks further delayed because of locked socket
Quick ack mode was activated 1138 times
551665 packets directly queued to recvmsg prequeue.
59290 bytes directly in process context from backlog
70983241 bytes directly received in process context from prequeue
4699048 packet headers predicted
366628 packets header predicted and directly queued to user
119361 acknowledgments not containing data payload received
473182 predicted acknowledgments
819 times recovered from packet loss by selective acknowledgements
3 congestion windows recovered without slow start by DSACK
263 congestion windows recovered without slow start after partial ack
612 TCP data loss events
TCPLostRetransmit: 8
233 timeouts after SACK recovery
23 timeouts in loss state
2389 fast retransmits
79 forward retransmits
4547 retransmits in slow start
2865 other TCP timeouts
31 SACK retransmits failed
1141 DSACKs sent for old packets
491 DSACKs received
10 DSACKs for out of order packets received
14 connections aborted due to timeout
TCPSACKDiscard: 4498
TCPDSACKIgnoredOld: 355
TCPDSACKIgnoredNoUndo: 104
TCPSpuriousRTOs: 16
TCPSackShifted: 1423
TCPSackMerged: 1800
TCPSackShiftFallback: 2403
IpExt:
InMcastPkts: 3433
InOctets: 418520700
OutOctets: 804311608
InMcastOctets: 109856


** PCI devices:
00:00.0 Host bridge [0600]: Intel Corporation Xeon E3-1200 Processor Family DRAM Controller [8086:0108] (rev 09)
Subsystem: Intel Corporation Device [8086:2010]
Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr+ Stepping- SERR+ FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- <TAbort+ <MAbort+ >SERR- <PERR- INTx-
Latency: 0
Capabilities: <access denied>

00:19.0 Ethernet controller [0200]: Intel Corporation 82579LM Gigabit Network Connection [8086:1502] (rev 05)
Subsystem: Intel Corporation Device [8086:3578]
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr+ Stepping- SERR+ FastB2B- DisINTx+
Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- <TAbort- <MAbort- >SERR- <PERR- INTx-
Latency: 0
Interrupt: pin A routed to IRQ 317
Region 0: Memory at c1a00000 (32-bit, non-prefetchable) [size=128K]
Region 1: Memory at c1a70000 (32-bit, non-prefetchable) [size=4K]
Region 2: I/O ports at 3040 [size=32]
Capabilities: <access denied>
Kernel driver in use: e1000e

00:1a.0 USB Controller [0c03]: Intel Corporation 6 Series/C200 Series Chipset Family USB Enhanced Host Controller #2 [8086:1c2d] (rev 05) (prog-if 20 [EHCI])
Subsystem: Intel Corporation Device [8086:7270]
Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr+ Stepping- SERR+ FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=medium >TAbort- <TAbort- <MAbort- >SERR- <PERR- INTx-
Latency: 0
Interrupt: pin B routed to IRQ 22
Region 0: Memory at c1a60000 (32-bit, non-prefetchable) [size=1K]
Capabilities: <access denied>
Kernel driver in use: ehci_hcd

00:1c.0 PCI bridge [0604]: Intel Corporation 6 Series/C200 Series Chipset Family PCI Express Root Port 1 [8086:1c10] (rev b5) (prog-if 00 [Normal decode])
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr+ Stepping- SERR+ FastB2B- DisINTx+
Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- <TAbort- <MAbort- >SERR- <PERR- INTx-
Latency: 0, Cache Line Size: 64 bytes
Bus: primary=00, secondary=01, subordinate=01, sec-latency=0
Secondary status: 66MHz- FastB2B- ParErr- DEVSEL=fast >TAbort- <TAbort- <MAbort+ <SERR- <PERR-
BridgeCtl: Parity+ SERR+ NoISA- VGA- MAbort- >Reset- FastB2B-
PriDiscTmr- SecDiscTmr- DiscTmrStat- DiscTmrSERREn-
Capabilities: <access denied>
Kernel driver in use: pcieport

00:1c.4 PCI bridge [0604]: Intel Corporation 6 Series/C200 Series Chipset Family PCI Express Root Port 5 [8086:1c18] (rev b5) (prog-if 00 [Normal decode])
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr+ Stepping- SERR+ FastB2B- DisINTx+
Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- <TAbort- <MAbort- >SERR- <PERR- INTx-
Latency: 0, Cache Line Size: 64 bytes
Bus: primary=00, secondary=02, subordinate=02, sec-latency=0
I/O behind bridge: 00002000-00002fff
Memory behind bridge: c1900000-c19fffff
Secondary status: 66MHz- FastB2B- ParErr- DEVSEL=fast >TAbort- <TAbort- <MAbort- <SERR- <PERR-
BridgeCtl: Parity+ SERR+ NoISA- VGA- MAbort- >Reset- FastB2B-
PriDiscTmr- SecDiscTmr- DiscTmrStat- DiscTmrSERREn-
Capabilities: <access denied>
Kernel driver in use: pcieport

00:1c.5 PCI bridge [0604]: Intel Corporation 6 Series/C200 Series Chipset Family PCI Express Root Port 6 [8086:1c1a] (rev b5) (prog-if 00 [Normal decode])
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr+ Stepping- SERR+ FastB2B- DisINTx+
Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort+ <TAbort- <MAbort- >SERR- <PERR- INTx-
Latency: 0, Cache Line Size: 64 bytes
Bus: primary=00, secondary=03, subordinate=03, sec-latency=0
Memory behind bridge: c0000000-c18fffff
Secondary status: 66MHz- FastB2B- ParErr- DEVSEL=fast >TAbort- <TAbort+ <MAbort+ <SERR- <PERR-
BridgeCtl: Parity+ SERR+ NoISA- VGA+ MAbort- >Reset- FastB2B-
PriDiscTmr- SecDiscTmr- DiscTmrStat- DiscTmrSERREn-
Capabilities: <access denied>
Kernel driver in use: pcieport

00:1d.0 USB Controller [0c03]: Intel Corporation 6 Series/C200 Series Chipset Family USB Enhanced Host Controller #1 [8086:1c26] (rev 05) (prog-if 20 [EHCI])
Subsystem: Intel Corporation Device [8086:7270]
Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr+ Stepping- SERR+ FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=medium >TAbort- <TAbort- <MAbort- >SERR- <PERR- INTx-
Latency: 0
Interrupt: pin A routed to IRQ 20
Region 0: Memory at c1a50000 (32-bit, non-prefetchable) [size=1K]
Capabilities: <access denied>
Kernel driver in use: ehci_hcd

00:1e.0 PCI bridge [0604]: Intel Corporation 82801 PCI Bridge [8086:244e] (rev a5) (prog-if 01 [Subtractive decode])
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr+ Stepping- SERR+ FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- <TAbort- <MAbort- >SERR- <PERR- INTx-
Latency: 0
Bus: primary=00, secondary=04, subordinate=04, sec-latency=32
Secondary status: 66MHz- FastB2B+ ParErr- DEVSEL=medium >TAbort- <TAbort- <MAbort+ <SERR- <PERR-
BridgeCtl: Parity+ SERR+ NoISA- VGA- MAbort- >Reset- FastB2B-
PriDiscTmr- SecDiscTmr+ DiscTmrStat- DiscTmrSERREn+
Capabilities: <access denied>

00:1f.0 ISA bridge [0601]: Intel Corporation C204 Chipset Family LPC Controller [8086:1c54] (rev 05)
Subsystem: Intel Corporation Device [8086:7270]
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr+ Stepping- SERR+ FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=medium >TAbort- <TAbort- <MAbort- >SERR- <PERR- INTx-
Latency: 0
Capabilities: <access denied>

00:1f.2 SATA controller [0106]: Intel Corporation 6 Series/C200 Series Chipset Family 6 port SATA AHCI Controller [8086:1c02] (rev 05) (prog-if 01 [AHCI 1.0])
Subsystem: Intel Corporation Device [8086:7270]
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr+ Stepping- SERR- FastB2B- DisINTx+
Status: Cap+ 66MHz+ UDF- FastB2B+ ParErr- DEVSEL=medium >TAbort- <TAbort- <MAbort- >SERR- <PERR- INTx-
Latency: 0
Interrupt: pin B routed to IRQ 321
Region 0: I/O ports at 3090 [size=8]
Region 1: I/O ports at 3080 [size=4]
Region 2: I/O ports at 3070 [size=8]
Region 3: I/O ports at 3060 [size=4]
Region 4: I/O ports at 3020 [size=32]
Region 5: Memory at c1a40000 (32-bit, non-prefetchable) [size=2K]
Capabilities: <access denied>
Kernel driver in use: ahci

00:1f.3 SMBus [0c05]: Intel Corporation 6 Series/C200 Series Chipset Family SMBus Controller [8086:1c22] (rev 05)
Subsystem: Intel Corporation Device [8086:7270]
Control: I/O+ Mem+ BusMaster- SpecCycle- MemWINV- VGASnoop- ParErr+ Stepping- SERR+ FastB2B- DisINTx-
Status: Cap- 66MHz- UDF- FastB2B+ ParErr- DEVSEL=medium >TAbort- <TAbort- <MAbort- >SERR- <PERR- INTx-
Interrupt: pin D routed to IRQ 22
Region 0: Memory at c1a30000 (64-bit, non-prefetchable) [size=256]
Region 4: I/O ports at 3000 [size=32]
Kernel driver in use: i801_smbus

02:00.0 Ethernet controller [0200]: Intel Corporation 82574L Gigabit Network Connection [8086:10d3]
Subsystem: Intel Corporation Device [8086:3578]
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr+ Stepping- SERR+ FastB2B- DisINTx+
Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- <TAbort- <MAbort- >SERR- <PERR- INTx-
Latency: 0, Cache Line Size: 64 bytes
Interrupt: pin A routed to IRQ 16
Region 0: Memory at c1900000 (32-bit, non-prefetchable) [size=128K]
Region 2: I/O ports at 2000 [size=32]
Region 3: Memory at c1920000 (32-bit, non-prefetchable) [size=16K]
Capabilities: <access denied>
Kernel driver in use: e1000e

03:00.0 VGA compatible controller [0300]: Matrox Graphics, Inc. MGA G200e [Pilot] ServerEngines (SEP1) [102b:0522] (rev 04) (prog-if 00 [VGA controller])
Subsystem: Intel Corporation Device [8086:0101]
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr+ Stepping- SERR+ FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- <TAbort- <MAbort- >SERR- <PERR- INTx-
Latency: 0, Cache Line Size: 64 bytes
Interrupt: pin A routed to IRQ 11
Region 0: Memory at c0000000 (32-bit, non-prefetchable) [size=16M]
Region 1: Memory at c1810000 (32-bit, non-prefetchable) [size=16K]
Region 2: Memory at c1000000 (32-bit, non-prefetchable) [size=8M]
Expansion ROM at c1800000 [disabled] [size=64K]
Capabilities: <access denied>


** USB devices:
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 001 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub
Bus 002 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub
Bus 001 Device 003: ID 046b:ff10 American Megatrends, Inc.


-- System Information:
Debian Release: wheezy/sid
APT prefers testing
APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.0.0-1-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages linux-image-3.0.0-1-amd64 depends on:
ii debconf [debconf-2.0] 1.5.41
ii initramfs-tools [linux-initramfs-tool] 0.99
ii linux-base 3.3
ii module-init-tools 3.16-1

Versions of packages linux-image-3.0.0-1-amd64 recommends:
pn firmware-linux-free <none>

Versions of packages linux-image-3.0.0-1-amd64 suggests:
pn grub-pc 1.99-12
pn linux-doc-3.0.0 <none>

Versions of packages linux-image-3.0.0-1-amd64 is related to:
ii firmware-bnx2 <none>
ii firmware-bnx2x <none>
ii firmware-ipw2x00 <none>
ii firmware-ivtv <none>
ii firmware-iwlwifi <none>
ii firmware-linux <none>
ii firmware-linux-nonfree <none>
ii firmware-qlogic <none>
ii firmware-ralink <none>
ii xen-hypervisor-4.0-amd64 [xen-hypervisor] 4.0.1-2

-- debconf information:
linux-image-3.0.0-1-amd64/postinst/ignoring-ramdisk:
linux-image-3.0.0-1-amd64/prerm/removing-running-kernel-3.0.0-1-amd64: true
linux-image-3.0.0-1-amd64/postinst/missing-firmware-3.0.0-1-amd64:
linux-image-3.0.0-1-amd64/postinst/depmod-error-initrd-3.0.0-1-amd64: false



--
To UNSUBSCRIBE, email to debian-kernel-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: 20110919210045.3256.61939.reportbug@xen-dom0.xen.irush.su">http://lists.debian.org/20110919210045.3256.61939.reportbug@xen-dom0.xen.irush.su
 
Old 09-20-2011, 06:12 AM
rush
 
Default Bug#642154: BUG: unable to handle kernel paging request at ffff8803bb6ad000

Hi,

There are several Not tainted lines in old messages file. There are all of them:

Sep 10 22:35:33 xen-dom0 kernel: [24183.985513] Pid: 2605, comm:
debootstrap Not tainted 3.0.0-1-amd64 #1 Intel Corporation
S1200BTL/S1200BTL
Sep 10 22:35:33 xen-dom0 kernel: [24183.985621] RIP:
e030:[<ffffffff810106db>] [<ffffffff810106db>]
__sanitize_i387_state+0x23/0xe1
Sep 10 22:35:33 xen-dom0 kernel: [24183.985716] RSP:
e02b:ffff8803bd2c5e00 EFLAGS: 00010246
Sep 10 22:35:33 xen-dom0 kernel: [24183.985767] RAX: 0000000000000000
RBX: 00007fff3d69ecc0 RCX: 0000000000000200
Sep 10 22:35:33 xen-dom0 kernel: [24183.985824] RDX: ffff8803be0e8e00
RSI: ffff8803bd2c5fd8 RDI: ffff8803bd65aa30
Sep 10 22:35:33 xen-dom0 kernel: [24183.985882] RBP: ffff8803bd65aa30
R08: 0000000000000000 R09: 0000000000000002
Sep 10 22:35:33 xen-dom0 kernel: [24183.985939] R10: 00000000000156c1
R11: 0000000000000246 R12: 0000000000000000
Sep 10 22:35:33 xen-dom0 kernel: [24183.985997] R13: ffffffffffffffff
R14: ffff8803bd65aa30 R15: 00007fff3d69ecc0
Sep 10 22:35:33 xen-dom0 kernel: [24183.986056] FS:
00007fd34091b700(0000) GS:ffff8803d61f1000(0000)
knlGS:0000000000000000
Sep 10 22:35:33 xen-dom0 kernel: [24183.986144] CS: e033 DS: 0000 ES:
0000 CR0: 000000008005003b
Sep 10 22:35:33 xen-dom0 kernel: [24183.986197] CR2: ffff8803be0e9000
CR3: 00000003bc19b000 CR4: 0000000000002660
Sep 10 22:35:33 xen-dom0 kernel: [24183.986255] DR0: 0000000000000000
DR1: 0000000000000000 DR2: 0000000000000000
Sep 10 22:35:33 xen-dom0 kernel: [24183.986312] DR3: 0000000000000000
DR6: 00000000ffff0ff0 DR7: 0000000000000400
Sep 10 22:35:33 xen-dom0 kernel: [24183.986370] Process debootstrap
(pid: 2605, threadinfo ffff8803bd2c4000, task ffff8803bd65aa30)
Sep 10 22:35:33 xen-dom0 kernel: [24183.986500] ffffffff81010919
00007fff3d69ef90 ffff8803bd2c5f58 0000000000000011
Sep 10 22:35:33 xen-dom0 kernel: [24183.986606] ffff8803bd65aec0
ffffffffffffffff ffffffff81008fdd ffffffff810459d6
Sep 10 22:35:33 xen-dom0 kernel: [24183.986713] 00007fff3d69eaf8
0000000000000011 0000000000040001 0000000000000a2e
Sep 10 22:35:33 xen-dom0 kernel: [24183.986864] [<ffffffff81010919>]
? save_i387_xstate+0x102/0x1f3
Sep 10 22:35:33 xen-dom0 kernel: [24183.986919] [<ffffffff81008fdd>]
? do_signal+0x212/0x649
Sep 10 22:35:33 xen-dom0 kernel: [24183.986972] [<ffffffff810459d6>]
? copy_process+0x108f/0x10eb
Sep 10 22:35:33 xen-dom0 kernel: [24183.987026] [<ffffffff81009450>]
? do_notify_resume+0x25/0x6b
Sep 10 22:35:33 xen-dom0 kernel: [24183.987082] [<ffffffff8133bfe0>]
? int_signal+0x12/0x17
Sep 10 22:35:33 xen-dom0 kernel: [24183.987737] RSP <ffff8803bd2c5e00>
Sep 10 22:35:33 xen-dom0 kernel: [24183.988232] ---[ end trace
031dc278e15801af ]---


Sep 11 12:55:02 xen-dom0 kernel: [ 398.590259] Pid: 2842, comm: forks
Not tainted 3.0.0-1-amd64 #1 Intel Corporation S1200BTL/S1200BTL
Sep 11 12:55:02 xen-dom0 kernel: [ 398.590591] RIP:
e030:[<ffffffff810106db>] [<ffffffff810106db>]
__sanitize_i387_state+0x23/0xe1
Sep 11 12:55:02 xen-dom0 kernel: [ 398.590799] RSP:
e02b:ffff8803be7c3e00 EFLAGS: 00010246
Sep 11 12:55:02 xen-dom0 kernel: [ 398.590905] RAX: 0000000000000000
RBX: 00007fff1f25e7c0 RCX: 0000000000000200
Sep 11 12:55:02 xen-dom0 kernel: [ 398.591018] RDX: ffff8803bbd42e00
RSI: ffff8803be7c3fd8 RDI: ffff8803bcbaee20
Sep 11 12:55:02 xen-dom0 kernel: [ 398.591130] RBP: ffff8803bcbaee20
R08: ffff8803be7c2000 R09: ffffffff81684640
Sep 11 12:55:02 xen-dom0 kernel: [ 398.591243] R10: 00007fc94d5dd9d0
R11: 0000000000000246 R12: 0000000000000000
Sep 11 12:55:02 xen-dom0 kernel: [ 398.591355] R13: ffffffffffffffff
R14: ffff8803bcbaee20 R15: 00007fff1f25e7c0
Sep 11 12:55:02 xen-dom0 kernel: [ 398.591471] FS:
00007fc94d5dd700(0000) GS:ffff8803d616a000(0000)
knlGS:0000000000000000
Sep 11 12:55:02 xen-dom0 kernel: [ 398.591614] CS: e033 DS: 0000 ES:
0000 CR0: 000000008005003b
Sep 11 12:55:02 xen-dom0 kernel: [ 398.591721] CR2: ffff8803bbd43000
CR3: 00000003bd18d000 CR4: 0000000000002660
Sep 11 12:55:02 xen-dom0 kernel: [ 398.591833] DR0: 0000000000000000
DR1: 0000000000000000 DR2: 0000000000000000
Sep 11 12:55:02 xen-dom0 kernel: [ 398.591945] DR3: 0000000000000000
DR6: 00000000ffff0ff0 DR7: 0000000000000400
Sep 11 12:55:02 xen-dom0 kernel: [ 398.592059] Process forks (pid:
2842, threadinfo ffff8803be7c2000, task ffff8803bcbaee20)
Sep 11 12:55:02 xen-dom0 kernel: [ 398.592296] ffffffff81010919
0000000000413201 ffff8803be7c3f58 0000000000000011
Sep 11 12:55:02 xen-dom0 kernel: [ 398.592684] ffff8803bcbaf2b0
ffffffffffffffff ffffffff81008fdd 0000000000000000
Sep 11 12:55:02 xen-dom0 kernel: [ 398.593071] 00007fff1f25e5f8
0000000000000011 0000000000040001 0000fffe00000b1b
Sep 11 12:55:02 xen-dom0 kernel: [ 398.593559] [<ffffffff81010919>]
? save_i387_xstate+0x102/0x1f3
Sep 11 12:55:02 xen-dom0 kernel: [ 398.593668] [<ffffffff81008fdd>]
? do_signal+0x212/0x649
Sep 11 12:55:02 xen-dom0 kernel: [ 398.593776] [<ffffffff81009450>]
? do_notify_resume+0x25/0x6b
Sep 11 12:55:02 xen-dom0 kernel: [ 398.593886] [<ffffffff810fbfa6>]
? sys_read+0x5f/0x6b
Sep 11 12:55:02 xen-dom0 kernel: [ 398.593994] [<ffffffff8133bfe0>]
? int_signal+0x12/0x17
Sep 11 12:55:02 xen-dom0 kernel: [ 398.598565] RSP <ffff8803be7c3e00>
Sep 11 12:55:02 xen-dom0 kernel: [ 398.598766] ---[ end trace
faf450ed9447681f ]---
Sep 11 12:55:02 xen-dom0 kernel: [ 399.085482] PGD 1604067 PUD
3d80d8067 PMD 3d81d6067 PTE 0
Sep 11 12:55:02 xen-dom0 kernel: [ 399.086059] CPU 1
Sep 11 12:55:02 xen-dom0 kernel: [ 399.086127] Modules linked in:
xt_tcpudp xt_physdev iptable_filter ip_tables x_tables xen_netback
xen_blkback bridge stp xen_evtchn xenfs loop snd_pcm snd_timer joydev
evdev snd ghes soundcore video snd_page_alloc processor button
i2c_i801 pcspkr i2c_core hed ext4 mbcache jbd2 crc16 dm_mod raid1
md_mod usbhid hid sg sd_mod crc_t10dif ahci libahci libata scsi_mod
ehci_hcd thermal fan usbcore thermal_sys e1000e [last unloaded:
scsi_wait_scan]
Sep 11 12:55:02 xen-dom0 kernel: [ 399.089714]


Sep 12 11:50:04 xen-dom0 kernel: [ 427.880160] Pid: 2795, comm:
processes Not tainted 3.0.0-1-amd64 #1 Intel Corporation
S1200BTL/S1200BTL
Sep 12 11:50:04 xen-dom0 kernel: [ 427.880492] RIP:
e030:[<ffffffff810106db>] [<ffffffff810106db>]
__sanitize_i387_state+0x23/0xe1
Sep 12 11:50:04 xen-dom0 kernel: [ 427.880699] RSP:
e02b:ffff8803bd9f5e00 EFLAGS: 00010246
Sep 12 11:50:04 xen-dom0 kernel: [ 427.880805] RAX: 0000000000000000
RBX: 00007fff761e8f80 RCX: 0000000000000200
Sep 12 11:50:04 xen-dom0 kernel: [ 427.880917] RDX: ffff8803bdfcfe00
RSI: ffff8803bd9f5fd8 RDI: ffff8803bd45c280
Sep 12 11:50:04 xen-dom0 kernel: [ 427.881029] RBP: ffff8803bd45c280
R08: ffff8803bd9f4000 R09: ffffffff81684640
Sep 12 11:50:04 xen-dom0 kernel: [ 427.881142] R10: 00007f74893a79d0
R11: 0000000000000246 R12: 0000000000000000
Sep 12 11:50:04 xen-dom0 kernel: [ 427.881255] R13: ffffffffffffffff
R14: ffff8803bd45c280 R15: 00007fff761e8f80
Sep 12 11:50:04 xen-dom0 kernel: [ 427.881369] FS:
00007f74893a7700(0000) GS:ffff8803d616a000(0000)
knlGS:0000000000000000
Sep 12 11:50:04 xen-dom0 kernel: [ 427.881512] CS: e033 DS: 0000 ES:
0000 CR0: 000000008005003b
Sep 12 11:50:04 xen-dom0 kernel: [ 427.881619] CR2: ffff8803bdfd0000
CR3: 00000003bc08d000 CR4: 0000000000002660
Sep 12 11:50:04 xen-dom0 kernel: [ 427.881732] DR0: 0000000000000000
DR1: 0000000000000000 DR2: 0000000000000000
Sep 12 11:50:04 xen-dom0 kernel: [ 427.881844] DR3: 0000000000000000
DR6: 00000000ffff0ff0 DR7: 0000000000000400
Sep 12 11:50:04 xen-dom0 kernel: [ 427.881957] Process processes
(pid: 2795, threadinfo ffff8803bd9f4000, task ffff8803bd45c280)
Sep 12 11:50:04 xen-dom0 kernel: [ 427.882196] ffffffff81010919
0000000000413201 ffff8803bd9f5f58 0000000000000011
Sep 12 11:50:04 xen-dom0 kernel: [ 427.882585] ffff8803bd45c710
ffffffffffffffff ffffffff81008fdd 0000000000000000
Sep 12 11:50:04 xen-dom0 kernel: [ 427.882973] 00007fff761e8db8
0000000000000011 0000000000040001 0000fffe00000aec
Sep 12 11:50:04 xen-dom0 kernel: [ 427.883458] [<ffffffff81010919>]
? save_i387_xstate+0x102/0x1f3
Sep 12 11:50:04 xen-dom0 kernel: [ 427.883569] [<ffffffff81008fdd>]
? do_signal+0x212/0x649
Sep 12 11:50:04 xen-dom0 kernel: [ 427.883677] [<ffffffff81009450>]
? do_notify_resume+0x25/0x6b
Sep 12 11:50:04 xen-dom0 kernel: [ 427.883787] [<ffffffff810fbfa6>]
? sys_read+0x5f/0x6b
Sep 12 11:50:04 xen-dom0 kernel: [ 427.883894] [<ffffffff8133bfe0>]
? int_signal+0x12/0x17
Sep 12 11:50:04 xen-dom0 kernel: [ 427.888459] RSP <ffff8803bd9f5e00>
Sep 12 11:50:04 xen-dom0 kernel: [ 427.888657] ---[ end trace
b28c5388f915deda ]---


Sep 13 09:35:02 xen-dom0 kernel: [ 204.135906] Pid: 2073, comm: cpu
Not tainted 3.0.0-1-amd64 #1 Intel Corporation S1200BTL/S1200BTL
Sep 13 09:35:02 xen-dom0 kernel: [ 204.136238] RIP:
e030:[<ffffffff810106db>] [<ffffffff810106db>]
__sanitize_i387_state+0x23/0xe1
Sep 13 09:35:02 xen-dom0 kernel: [ 204.136446] RSP:
e02b:ffff8803bdfbbe00 EFLAGS: 00010246
Sep 13 09:35:02 xen-dom0 kernel: [ 204.136554] RAX: 0000000000000000
RBX: 00007fff578fa0c0 RCX: 0000000000000200
Sep 13 09:35:02 xen-dom0 kernel: [ 204.136666] RDX: ffff8803be05de00
RSI: ffff8803bdfbbfd8 RDI: ffff8803bc3ae340
Sep 13 09:35:02 xen-dom0 kernel: [ 204.136778] RBP: ffff8803bc3ae340
R08: dead000000200200 R09: ffff8803bc285b98
Sep 13 09:35:02 xen-dom0 kernel: [ 204.136889] R10: 0000000000000000
R11: 0000000000000202 R12: 0000000000000000
Sep 13 09:35:02 xen-dom0 kernel: [ 204.137001] R13: ffffffffffffffff
R14: ffff8803bc3ae340 R15: 00007fff578fa0c0
Sep 13 09:35:02 xen-dom0 kernel: [ 204.137115] FS:
00007ff8162dc700(0000) GS:ffff8803d61f1000(0000)
knlGS:0000000000000000
Sep 13 09:35:02 xen-dom0 kernel: [ 204.137258] CS: e033 DS: 0000 ES:
0000 CR0: 000000008005003b
Sep 13 09:35:02 xen-dom0 kernel: [ 204.137365] CR2: ffff8803be05e000
CR3: 00000003bbfb5000 CR4: 0000000000002660
Sep 13 09:35:02 xen-dom0 kernel: [ 204.137479] DR0: 0000000000000000
DR1: 0000000000000000 DR2: 0000000000000000
Sep 13 09:35:02 xen-dom0 kernel: [ 204.137591] DR3: 0000000000000000
DR6: 00000000ffff0ff0 DR7: 0000000000000400
Sep 13 09:35:02 xen-dom0 kernel: [ 204.137705] Process cpu (pid:
2073, threadinfo ffff8803bdfba000, task ffff8803bc3ae340)
Sep 13 09:35:02 xen-dom0 kernel: [ 204.137942] ffffffff81010919
0000000000000001 ffff8803bdfbbf58 0000000000000011
Sep 13 09:35:02 xen-dom0 kernel: [ 204.138329] ffff8803bc3ae7d0
ffffffffffffffff ffffffff81008fdd 000000000000021a
Sep 13 09:35:02 xen-dom0 kernel: [ 204.138715] 00007fff578f9ef8
0000000000000011 0000000000040001 0000fffe0000081a
Sep 13 09:35:02 xen-dom0 kernel: [ 204.139203] [<ffffffff81010919>]
? save_i387_xstate+0x102/0x1f3
Sep 13 09:35:02 xen-dom0 kernel: [ 204.139314] [<ffffffff81008fdd>]
? do_signal+0x212/0x649
Sep 13 09:35:02 xen-dom0 kernel: [ 204.139423] [<ffffffff81009450>]
? do_notify_resume+0x25/0x6b
Sep 13 09:35:02 xen-dom0 kernel: [ 204.139533] [<ffffffff8133bfe0>]
? int_signal+0x12/0x17
Sep 13 09:35:02 xen-dom0 kernel: [ 204.144090] RSP <ffff8803bdfbbe00>
Sep 13 09:35:02 xen-dom0 kernel: [ 204.144288] ---[ end trace
fe08e05b493d907e ]---


Sep 13 13:41:14 xen-dom0 kernel: [ 18.196671] Pid: 1851, comm:
munin-node Not tainted 3.0.0-1-amd64 #1 Intel Corporation
S1200BTL/S1200BTL
Sep 13 13:41:14 xen-dom0 kernel: [ 18.197003] RIP:
e030:[<ffffffff810106db>] [<ffffffff810106db>]
__sanitize_i387_state+0x23/0xe1
Sep 13 13:41:14 xen-dom0 kernel: [ 18.197210] RSP:
e02b:ffff8803bcdc1e00 EFLAGS: 00010246
Sep 13 13:41:14 xen-dom0 kernel: [ 18.197315] RAX: 0000000000000000
RBX: 00007ffff8019ac0 RCX: 0000000000000200
Sep 13 13:41:14 xen-dom0 kernel: [ 18.197427] RDX: ffff8803bd82be00
RSI: ffff8803bcdc1fd8 RDI: ffff8803bd3110e0
Sep 13 13:41:14 xen-dom0 kernel: [ 18.197538] RBP: ffff8803bd3110e0
R08: ffff8803bcdc0000 R09: ffffffff81684640
Sep 13 13:41:14 xen-dom0 kernel: [ 18.197650] R10: 0000000000000000
R11: 0000000000000246 R12: 0000000000000000
Sep 13 13:41:14 xen-dom0 kernel: [ 18.197761] R13: ffffffffffffffff
R14: ffff8803bd3110e0 R15: 00007ffff8019ac0
Sep 13 13:41:14 xen-dom0 kernel: [ 18.197875] FS:
00007f464a3a4700(0000) GS:ffff8803d614f000(0000)
knlGS:0000000000000000
Sep 13 13:41:14 xen-dom0 kernel: [ 18.198018] CS: e033 DS: 0000 ES:
0000 CR0: 000000008005003b
Sep 13 13:41:14 xen-dom0 kernel: [ 18.198127] CR2: ffff8803bd82c000
CR3: 00000003bbf60000 CR4: 0000000000002660
Sep 13 13:41:14 xen-dom0 kernel: [ 18.198239] DR0: 0000000000000000
DR1: 0000000000000000 DR2: 0000000000000000
Sep 13 13:41:14 xen-dom0 kernel: [ 18.198351] DR3: 0000000000000000
DR6: 00000000ffff0ff0 DR7: 0000000000000400
Sep 13 13:41:14 xen-dom0 kernel: [ 18.198464] Process munin-node
(pid: 1851, threadinfo ffff8803bcdc0000, task ffff8803bd3110e0)
Sep 13 13:41:14 xen-dom0 kernel: [ 18.198703] ffffffff81010919
00007ffff8019dc0 ffff8803bcdc1f58 0000000000000011
Sep 13 13:41:14 xen-dom0 kernel: [ 18.199091] ffff8803bd311570
ffffffffffffffff ffffffff81008fdd 0000000000000000
Sep 13 13:41:14 xen-dom0 kernel: [ 18.199480] 00007ffff80198f8
0000000000000011 0000000000040001 0000000000000746
Sep 13 13:41:14 xen-dom0 kernel: [ 18.199966] [<ffffffff81010919>]
? save_i387_xstate+0x102/0x1f3
Sep 13 13:41:14 xen-dom0 kernel: [ 18.200076] [<ffffffff81008fdd>]
? do_signal+0x212/0x649
Sep 13 13:41:14 xen-dom0 kernel: [ 18.200183] [<ffffffff81009450>]
? do_notify_resume+0x25/0x6b
Sep 13 13:41:14 xen-dom0 kernel: [ 18.200292] [<ffffffff810fbfa6>]
? sys_read+0x5f/0x6b
Sep 13 13:41:14 xen-dom0 kernel: [ 18.200400] [<ffffffff8133bfe0>]
? int_signal+0x12/0x17
Sep 13 13:41:14 xen-dom0 kernel: [ 18.204967] RSP <ffff8803bcdc1e00>
Sep 13 13:41:14 xen-dom0 kernel: [ 18.205167] ---[ end trace
d0006b6ebd79c20b ]---

Sep 14 10:50:03 xen-dom0 kernel: [ 609.687466] Pid: 3045, comm:
open_files Not tainted 3.0.0-1-amd64 #1 Intel Corporation
S1200BTL/S1200BTL
Sep 14 10:50:03 xen-dom0 kernel: [ 609.687798] RIP:
e030:[<ffffffff810106db>] [<ffffffff810106db>]
__sanitize_i387_state+0x23/0xe1
Sep 14 10:50:03 xen-dom0 kernel: [ 609.688005] RSP:
e02b:ffff8803bd9e7e00 EFLAGS: 00010246
Sep 14 10:50:03 xen-dom0 kernel: [ 609.688111] RAX: 0000000000000000
RBX: 00007fffc45ed2c0 RCX: 0000000000000200
Sep 14 10:50:03 xen-dom0 kernel: [ 609.688223] RDX: ffff8803b4409e00
RSI: ffff8803bd9e7fd8 RDI: ffff8803ba0fd590
Sep 14 10:50:03 xen-dom0 kernel: [ 609.688335] RBP: ffff8803ba0fd590
R08: ffff8803bd9e6000 R09: ffffffff81684640
Sep 14 10:50:03 xen-dom0 kernel: [ 609.688448] R10: 00007f5395b7f9d0
R11: 0000000000000246 R12: 0000000000000000
Sep 14 10:50:03 xen-dom0 kernel: [ 609.688560] R13: ffffffffffffffff
R14: ffff8803ba0fd590 R15: 00007fffc45ed2c0
Sep 14 10:50:03 xen-dom0 kernel: [ 609.688674] FS:
00007f5395b7f700(0000) GS:ffff8803d616a000(0000)
knlGS:0000000000000000
Sep 14 10:50:03 xen-dom0 kernel: [ 609.688816] CS: e033 DS: 0000 ES:
0000 CR0: 000000008005003b
Sep 14 10:50:03 xen-dom0 kernel: [ 609.688924] CR2: ffff8803b440a000
CR3: 00000003be7ab000 CR4: 0000000000002660
Sep 14 10:50:03 xen-dom0 kernel: [ 609.689037] DR0: 0000000000000000
DR1: 0000000000000000 DR2: 0000000000000000
Sep 14 10:50:03 xen-dom0 kernel: [ 609.689150] DR3: 0000000000000000
DR6: 00000000ffff0ff0 DR7: 0000000000000400
Sep 14 10:50:03 xen-dom0 kernel: [ 609.689263] Process open_files
(pid: 3045, threadinfo ffff8803bd9e6000, task ffff8803ba0fd590)
Sep 14 10:50:03 xen-dom0 kernel: [ 609.689502] ffffffff81010919
0000000000413201 ffff8803bd9e7f58 0000000000000011
Sep 14 10:50:03 xen-dom0 kernel: [ 609.689890] ffff8803ba0fda20
ffffffffffffffff ffffffff81008fdd 0000000000000000
Sep 14 10:50:03 xen-dom0 kernel: [ 609.690277] 00007fffc45ed0f8
0000000000000011 0000000000040001 0000fffe00000be6
Sep 14 10:50:03 xen-dom0 kernel: [ 609.690765] [<ffffffff81010919>]
? save_i387_xstate+0x102/0x1f3
Sep 14 10:50:03 xen-dom0 kernel: [ 609.690875] [<ffffffff81008fdd>]
? do_signal+0x212/0x649
Sep 14 10:50:03 xen-dom0 kernel: [ 609.690982] [<ffffffff81009450>]
? do_notify_resume+0x25/0x6b
Sep 14 10:50:03 xen-dom0 kernel: [ 609.691091] [<ffffffff810fbfa6>]
? sys_read+0x5f/0x6b
Sep 14 10:50:03 xen-dom0 kernel: [ 609.691199] [<ffffffff8133bfe0>]
? int_signal+0x12/0x17
Sep 14 10:50:03 xen-dom0 kernel: [ 609.695767] RSP <ffff8803bd9e7e00>
Sep 14 10:50:03 xen-dom0 kernel: [ 609.695966] ---[ end trace
718450c9ca97cca1 ]---

Sep 14 15:55:03 xen-dom0 kernel: [ 81.977077] Pid: 2288, comm:
http_loadtime Not tainted 3.0.0-1-amd64 #1 Intel Corporation
S1200BTL/S1200BTL
Sep 14 15:55:03 xen-dom0 kernel: [ 81.977411] RIP:
e030:[<ffffffff810106db>] [<ffffffff810106db>]
__sanitize_i387_state+0x23/0xe1
Sep 14 15:55:03 xen-dom0 kernel: [ 81.977618] RSP:
e02b:ffff8803bc323e00 EFLAGS: 00010246
Sep 14 15:55:03 xen-dom0 kernel: [ 81.977724] RAX: 0000000000000000
RBX: 00007fff6baab000 RCX: 0000000000000200
Sep 14 15:55:03 xen-dom0 kernel: [ 81.977837] RDX: ffff8803bda40e00
RSI: ffff8803bc323fd8 RDI: ffff8803bd2b88b0
Sep 14 15:55:03 xen-dom0 kernel: [ 81.977950] RBP: ffff8803bd2b88b0
R08: ffff8803bc322000 R09: ffffffff81684640
Sep 14 15:55:03 xen-dom0 kernel: [ 81.978061] R10: 00007ff6008c29d0
R11: 0000000000000246 R12: 0000000000000000
Sep 14 15:55:03 xen-dom0 kernel: [ 81.978173] R13: ffffffffffffffff
R14: ffff8803bd2b88b0 R15: 00007fff6baab000
Sep 14 15:55:03 xen-dom0 kernel: [ 81.978289] FS:
00007ff6008c2700(0000) GS:ffff8803d6185000(0000)
knlGS:0000000000000000
Sep 14 15:55:03 xen-dom0 kernel: [ 81.978432] CS: e033 DS: 0000 ES:
0000 CR0: 000000008005003b
Sep 14 15:55:03 xen-dom0 kernel: [ 81.978538] CR2: ffff8803bda41000
CR3: 00000003bdc4b000 CR4: 0000000000002660
Sep 14 15:55:03 xen-dom0 kernel: [ 81.978650] DR0: 0000000000000000
DR1: 0000000000000000 DR2: 0000000000000000
Sep 14 15:55:03 xen-dom0 kernel: [ 81.978764] DR3: 0000000000000000
DR6: 00000000ffff0ff0 DR7: 0000000000000400
Sep 14 15:55:03 xen-dom0 kernel: [ 81.978876] Process http_loadtime
(pid: 2288, threadinfo ffff8803bc322000, task ffff8803bd2b88b0)
Sep 14 15:55:03 xen-dom0 kernel: [ 81.979115] ffffffff81010919
0000000000413201 ffff8803bc323f58 0000000000000011
Sep 14 15:55:03 xen-dom0 kernel: [ 81.979499] ffff8803bd2b8d40
ffffffffffffffff ffffffff81008fdd 0000000000000000
Sep 14 15:55:03 xen-dom0 kernel: [ 81.979885] 00007fff6baaae38
0000000000000011 0000000000040001 0000fffe000008f1
Sep 14 15:55:03 xen-dom0 kernel: [ 81.980374] [<ffffffff81010919>]
? save_i387_xstate+0x102/0x1f3
Sep 14 15:55:03 xen-dom0 kernel: [ 81.980483] [<ffffffff81008fdd>]
? do_signal+0x212/0x649
Sep 14 15:55:03 xen-dom0 kernel: [ 81.980592] [<ffffffff8133733a>]
? error_exit+0x2a/0x60
Sep 14 15:55:03 xen-dom0 kernel: [ 81.980699] [<ffffffff81336e61>]
? retint_restore_args+0x5/0x6
Sep 14 15:55:03 xen-dom0 kernel: [ 81.980808] [<ffffffff8100122a>]
? hypercall_page+0x22a/0x1000
Sep 14 15:55:03 xen-dom0 kernel: [ 81.980917] [<ffffffff81009450>]
? do_notify_resume+0x25/0x6b
Sep 14 15:55:03 xen-dom0 kernel: [ 81.981025] [<ffffffff8133bfe0>]
? int_signal+0x12/0x17
Sep 14 15:55:03 xen-dom0 kernel: [ 81.985577] RSP <ffff8803bc323e00>
Sep 14 15:55:03 xen-dom0 kernel: [ 81.985777] ---[ end trace
c5c4b1b333d4399a ]---


Sep 15 02:10:03 xen-dom0 kernel: [ 3109.354096] Pid: 7447, comm:
processes Not tainted 3.0.0-1-amd64 #1 Intel Corporation
S1200BTL/S1200BTL
Sep 15 02:10:03 xen-dom0 kernel: [ 3109.354204] RIP:
e030:[<ffffffff810106db>] [<ffffffff810106db>]
__sanitize_i387_state+0x23/0xe1
Sep 15 02:10:03 xen-dom0 kernel: [ 3109.354300] RSP:
e02b:ffff8803bbf95e00 EFLAGS: 00010246
Sep 15 02:10:03 xen-dom0 kernel: [ 3109.354351] RAX: 0000000000000000
RBX: 00007fffe280adc0 RCX: 0000000000000200
Sep 15 02:10:03 xen-dom0 kernel: [ 3109.354409] RDX: ffff8803ba17ee00
RSI: ffff8803bbf95fd8 RDI: ffff8803bdab2380
Sep 15 02:10:03 xen-dom0 kernel: [ 3109.354467] RBP: ffff8803bdab2380
R08: ffff8803bbf94000 R09: ffffffff81684640
Sep 15 02:10:03 xen-dom0 kernel: [ 3109.354524] R10: 00007f5b502889d0
R11: 0000000000000246 R12: 0000000000000000
Sep 15 02:10:03 xen-dom0 kernel: [ 3109.354581] R13: ffffffffffffffff
R14: ffff8803bdab2380 R15: 00007fffe280adc0
Sep 15 02:10:03 xen-dom0 kernel: [ 3109.354641] FS:
00007f5b50288700(0000) GS:ffff8803d616a000(0000)
knlGS:0000000000000000
Sep 15 02:10:03 xen-dom0 kernel: [ 3109.354729] CS: e033 DS: 0000 ES:
0000 CR0: 000000008005003b
Sep 15 02:10:03 xen-dom0 kernel: [ 3109.354782] CR2: ffff8803ba17f000
CR3: 00000003bb69f000 CR4: 0000000000002660
Sep 15 02:10:03 xen-dom0 kernel: [ 3109.354840] DR0: 0000000000000000
DR1: 0000000000000000 DR2: 0000000000000000
Sep 15 02:10:03 xen-dom0 kernel: [ 3109.354897] DR3: 0000000000000000
DR6: 00000000ffff0ff0 DR7: 0000000000000400
Sep 15 02:10:03 xen-dom0 kernel: [ 3109.354955] Process processes
(pid: 7447, threadinfo ffff8803bbf94000, task ffff8803bdab2380)
Sep 15 02:10:03 xen-dom0 kernel: [ 3109.355084] ffffffff81010919
0000000000413201 ffff8803bbf95f58 0000000000000011
Sep 15 02:10:03 xen-dom0 kernel: [ 3109.355191] ffff8803bdab2810
ffffffffffffffff ffffffff81008fdd 0000000000000000
Sep 15 02:10:03 xen-dom0 kernel: [ 3109.355298] 00007fffe280abf8
0000000000000011 0000000000040001 0000fffe00001d18
Sep 15 02:10:03 xen-dom0 kernel: [ 3109.355449] [<ffffffff81010919>]
? save_i387_xstate+0x102/0x1f3
Sep 15 02:10:03 xen-dom0 kernel: [ 3109.355504] [<ffffffff81008fdd>]
? do_signal+0x212/0x649
Sep 15 02:10:03 xen-dom0 kernel: [ 3109.355557] [<ffffffff81009450>]
? do_notify_resume+0x25/0x6b
Sep 15 02:10:03 xen-dom0 kernel: [ 3109.355611] [<ffffffff810fbfa6>]
? sys_read+0x5f/0x6b
Sep 15 02:10:03 xen-dom0 kernel: [ 3109.355664] [<ffffffff8133bfe0>]
? int_signal+0x12/0x17
Sep 15 02:10:03 xen-dom0 kernel: [ 3109.356318] RSP <ffff8803bbf95e00>
Sep 15 02:10:03 xen-dom0 kernel: [ 3109.356818] ---[ end trace
35f1420b1560ce2e ]---

Hope it will help.

Best regards,
rush.



--
To UNSUBSCRIBE, email to debian-kernel-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: CA+rvmvK8G5hNq4wOkPdcDMufYS9bD559zvexMqG9gy=m7dkU_ A@mail.gmail.com">http://lists.debian.org/CA+rvmvK8G5hNq4wOkPdcDMufYS9bD559zvexMqG9gy=m7dkU_ A@mail.gmail.com
 
Old 09-20-2011, 01:20 PM
Ben Hutchings
 
Default Bug#642154: BUG: unable to handle kernel paging request at ffff8803bb6ad000

On Tue, 2011-09-20 at 10:12 +0400, rush wrote:
> Hi,
>
> There are several Not tainted lines in old messages file. There are all of them:
>
> Sep 10 22:35:33 xen-dom0 kernel: [24183.985513] Pid: 2605, comm:
> debootstrap Not tainted 3.0.0-1-amd64 #1 Intel Corporation
> S1200BTL/S1200BTL
> Sep 10 22:35:33 xen-dom0 kernel: [24183.985621] RIP:
> e030:[<ffffffff810106db>] [<ffffffff810106db>]
> __sanitize_i387_state+0x23/0xe1

Source/disassembly:

void __sanitize_i387_state(struct task_struct *tsk)
{
u64 xstate_bv;
int feature_bit = 0x2;
struct i387_fxsave_struct *fx = &tsk->thread.fpu.state->fxsave;
ffffffff810106b8: 48 8b 97 48 04 00 00 mov 0x448(%rdi),%rdx

if (!fx)
return;
ffffffff810106bf: 48 85 d2 test %rdx,%rdx
ffffffff810106c2: 0f 84 d0 00 00 00 je 0xffffffff81010798

BUG_ON(task_thread_info(tsk)->status & TS_USEDFPU);
ffffffff810106c8: 48 8b 47 08 mov 0x8(%rdi),%rax
ffffffff810106cc: f6 40 14 01 testb $0x1,0x14(%rax)
ffffffff810106d0: 74 02 je 0xffffffff810106d4
ffffffff810106d2: 0f 0b ud2

xstate_bv = tsk->thread.fpu.state->xsave.xsave_hdr.xstate_bv;
ffffffff810106db: 48 8b b2 00 02 00 00 mov 0x200(%rdx),%rsi

So tsk->thread.fpu.state in RDX seems to be invalid.

> Sep 10 22:35:33 xen-dom0 kernel: [24183.985716] RSP:
> e02b:ffff8803bd2c5e00 EFLAGS: 00010246
> Sep 10 22:35:33 xen-dom0 kernel: [24183.985767] RAX: 0000000000000000
> RBX: 00007fff3d69ecc0 RCX: 0000000000000200
> Sep 10 22:35:33 xen-dom0 kernel: [24183.985824] RDX: ffff8803be0e8e00
> RSI: ffff8803bd2c5fd8 RDI: ffff8803bd65aa30
[...]

RDX looks like a reasonable kernel memory pointer. Given the hostname,
I assume this kernel is running under Xen. So could this be a
use-after-free where the freed page has been unmapped for reallocation
by the hypervisor? Can that happen to arbitrary pages in the dom0
kernel?

Ben.

--
Ben Hutchings
Once a job is fouled up, anything done to improve it makes it worse.
 
Old 09-20-2011, 01:40 PM
Ian Campbell
 
Default Bug#642154: BUG: unable to handle kernel paging request at ffff8803bb6ad000

On Tue, 2011-09-20 at 14:20 +0100, Ben Hutchings wrote:
> On Tue, 2011-09-20 at 10:12 +0400, rush wrote:
> > Hi,
> >
> > There are several Not tainted lines in old messages file. There are all of them:
> >
> > Sep 10 22:35:33 xen-dom0 kernel: [24183.985513] Pid: 2605, comm:
> > debootstrap Not tainted 3.0.0-1-amd64 #1 Intel Corporation
> > S1200BTL/S1200BTL
> > Sep 10 22:35:33 xen-dom0 kernel: [24183.985621] RIP:
> > e030:[<ffffffff810106db>] [<ffffffff810106db>]
> > __sanitize_i387_state+0x23/0xe1
>
> Source/disassembly:
>
> void __sanitize_i387_state(struct task_struct *tsk)
> {
> u64 xstate_bv;
> int feature_bit = 0x2;
> struct i387_fxsave_struct *fx = &tsk->thread.fpu.state->fxsave;
> ffffffff810106b8: 48 8b 97 48 04 00 00 mov 0x448(%rdi),%rdx
>
> if (!fx)
> return;
> ffffffff810106bf: 48 85 d2 test %rdx,%rdx
> ffffffff810106c2: 0f 84 d0 00 00 00 je 0xffffffff81010798
>
> BUG_ON(task_thread_info(tsk)->status & TS_USEDFPU);
> ffffffff810106c8: 48 8b 47 08 mov 0x8(%rdi),%rax
> ffffffff810106cc: f6 40 14 01 testb $0x1,0x14(%rax)
> ffffffff810106d0: 74 02 je 0xffffffff810106d4
> ffffffff810106d2: 0f 0b ud2
>
> xstate_bv = tsk->thread.fpu.state->xsave.xsave_hdr.xstate_bv;
> ffffffff810106db: 48 8b b2 00 02 00 00 mov 0x200(%rdx),%rsi
>
> So tsk->thread.fpu.state in RDX seems to be invalid.
>
> > Sep 10 22:35:33 xen-dom0 kernel: [24183.985716] RSP:
> > e02b:ffff8803bd2c5e00 EFLAGS: 00010246
> > Sep 10 22:35:33 xen-dom0 kernel: [24183.985767] RAX: 0000000000000000
> > RBX: 00007fff3d69ecc0 RCX: 0000000000000200
> > Sep 10 22:35:33 xen-dom0 kernel: [24183.985824] RDX: ffff8803be0e8e00
> > RSI: ffff8803bd2c5fd8 RDI: ffff8803bd65aa30
> [...]
>
> RDX looks like a reasonable kernel memory pointer. Given the hostname,
> I assume this kernel is running under Xen. So could this be a
> use-after-free where the freed page has been unmapped for reallocation
> by the hypervisor? Can that happen to arbitrary pages in the dom0
> kernel?

In a modern pvops kernel there is a tendency towards leaving a page of
actual dom0 memory behind in these cases, rather than a hole. A page
with no backing mfn should never be escaping into the "wild" anyway but
it's possible fir a given process to see one if it is doing hypercall
activities, mapping foreign pages etc.

There's been some similar looking threads on xen-devel recently but I
haven't paid attention to the details, list & Konrad CC'd. Full log is
at http://bugs.debian.org/642154.

>
> Ben.
>

--
Ian Campbell

Everybody has something to conceal.
-- Humphrey Bogart




--
To UNSUBSCRIBE, email to debian-kernel-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: 1316526058.3891.65.camel@zakaz.uk.xensource.com">h ttp://lists.debian.org/1316526058.3891.65.camel@zakaz.uk.xensource.com
 
Old 10-01-2011, 02:50 AM
Jonathan Nieder
 
Default Bug#642154: BUG: unable to handle kernel paging request at ffff8803bb6ad000

Konrad Rzeszutek Wilk wrote:

>> There's been some similar looking threads on xen-devel recently but I
>> haven't paid attention to the details, list & Konrad CC'd. Full log is
>> at http://bugs.debian.org/642154.
>
> Does xsave=0 make a difference?

Cc-ing the reporter. Rush, are you able to reproduce the oops you
mentioned? Does adding noxsave to the kernel command line help?

Thanks,
Jonathan



--
To UNSUBSCRIBE, email to debian-kernel-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: 20111001025030.GA5198@elie.sbx02827.chicail.waypor t.net">http://lists.debian.org/20111001025030.GA5198@elie.sbx02827.chicail.waypor t.net
 
Old 10-01-2011, 07:01 AM
rush
 
Default Bug#642154: BUG: unable to handle kernel paging request at ffff8803bb6ad000

2011/10/1, Jonathan Nieder <jrnieder@gmail.com>:
>
> Cc-ing the reporter. Rush, are you able to reproduce the oops you
> mentioned? Does adding noxsave to the kernel command line help?
>

I'm sorry, i'm not guru in such questions.
Do I need to specify xsave=0 in grub boot options or there is another
way to do it?



--
To UNSUBSCRIBE, email to debian-kernel-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: CA+rvmvLkBVseDCKyfbd_mGSCrRUvov5Km_2Uoo6CZPZOG7ybv A@mail.gmail.com">http://lists.debian.org/CA+rvmvLkBVseDCKyfbd_mGSCrRUvov5Km_2Uoo6CZPZOG7ybv A@mail.gmail.com
 
Old 10-01-2011, 09:19 AM
Ian Campbell
 
Default Bug#642154: BUG: unable to handle kernel paging request at ffff8803bb6ad000

On Sat, 2011-10-01 at 11:01 +0400, rush wrote:
> 2011/10/1, Jonathan Nieder <jrnieder@gmail.com>:
> >
> > Cc-ing the reporter. Rush, are you able to reproduce the oops you
> > mentioned? Does adding noxsave to the kernel command line help?
> >
>
> I'm sorry, i'm not guru in such questions.
> Do I need to specify xsave=0 in grub boot options or there is another
> way to do it?

Assuming your system uses grub2 you should add it to GRUB_CMDLINE_LINUX
in /etc/default/grub and then run "update-grub".

Ian.
--
Ian Campbell


Place stamp here.
 
Old 10-01-2011, 05:34 PM
rush
 
Default Bug#642154: BUG: unable to handle kernel paging request at ffff8803bb6ad000

Unfortunately, xsave=0 didn't give any effect. Oops is still here.

[ 21.095558] BUG: unable to handle kernel paging request at ffff8803bb7c5000
[ 21.095827] IP: [<ffffffff810106db>] __sanitize_i387_state+0x23/0xe1
[ 21.096002] PGD 1604067 PUD 3d82d9067 PMD 3d84b5067 PTE 0
[ 21.096355] Oops: 0000 [#1] SMP
[ 21.096578] CPU 3
[ 21.096646] Modules linked in: bridge stp xen_evtchn xenfs loop
snd_pcm snd_timer snd i2c_i801 soundcore snd_page_alloc i2c_core
pcspkr evdev joydev ghes video hed button processor ext4 mbcache jbd2
crc16 dm_mod raid1 md_mod usbhid hid sg sd_mod crc_t10dif ahci libahci
libata scsi_mod ehci_hcd fan thermal usbcore thermal_sys e1000e [last
unloaded: scsi_wait_scan]
[ 21.099742]
[ 21.099835] Pid: 1207, comm: update-exim4.co Not tainted
3.0.0-1-amd64 #1 Intel Corporation S1200BTL/S1200BTL
[ 21.100169] RIP: e030:[<ffffffff810106db>] [<ffffffff810106db>]
__sanitize_i387_state+0x23/0xe1
[ 21.100376] RSP: e02b:ffff8803bbc77e00 EFLAGS: 00010246
[ 21.100481] RAX: 0000000000000000 RBX: 00007fffa6c18700 RCX: 0000000000000200
[ 21.100593] RDX: ffff8803bb7c4e00 RSI: ffff8803bbc77fd8 RDI: ffff8803bbd2ce20
[ 21.100705] RBP: ffff8803bbd2ce20 R08: dead000000200200 R09: ffff8803bda8c2d8
[ 21.100817] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 21.100929] R13: ffffffffffffffff R14: ffff8803bbd2ce20 R15: 00007fffa6c18700
[ 21.101043] FS: 00007f57dae43700(0000) GS:ffff8803d61a0000(0000)
knlGS:0000000000000000
[ 21.101185] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 21.101293] CR2: ffff8803bb7c5000 CR3: 00000003bdcce000 CR4: 0000000000002660
[ 21.101405] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 21.101516] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[ 21.101629] Process update-exim4.co (pid: 1207, threadinfo
ffff8803bbc76000, task ffff8803bbd2ce20)
[ 21.101774] Stack:
[ 21.101868] ffffffff81010919 0000000000000001 ffff8803bbc77f58
0000000000000011
[ 21.102254] ffff8803bbd2d2b0 ffffffffffffffff ffffffff81008fdd
00000000000002d8
[ 21.102642] 00007fffa6c18538 0000000000000011 0000000000040001
00000065000005d8
[ 21.103029] Call Trace:
[ 21.103128] [<ffffffff81010919>] ? save_i387_xstate+0x102/0x1f3
[ 21.103238] [<ffffffff81008fdd>] ? do_signal+0x212/0x649
[ 21.103346] [<ffffffff81009450>] ? do_notify_resume+0x25/0x6b
[ 21.103458] [<ffffffff8133bfe0>] ? int_signal+0x12/0x17
[ 21.103564] Code: e8 13 2a ff ff 66 90 c3 48 8b 97 48 04 00 00 48
85 d2 0f 84 d0 00 00 00 48 8b 47 08 f6 40 14 01 74 02 0f 0b 48 8b 05
45 4e 71 00
[ 21.106353] 8b b2 00 02 00 00 48 89 c1 48 21 f1 48 39 c1 0f 84 a7 00 00
[ 21.107848] RIP [<ffffffff810106db>] __sanitize_i387_state+0x23/0xe1
[ 21.108020] RSP <ffff8803bbc77e00>
[ 21.108119] CR2: ffff8803bb7c5000
[ 21.108218] ---[ end trace f589986fb387a3c2 ]---
[ 22.776339] BUG: unable to handle kernel paging request at ffff8803bb7c5000
[ 22.776579] IP: [<ffffffff810106db>] __sanitize_i387_state+0x23/0xe1
[ 22.776754] PGD 1604067 PUD 3d82d9067 PMD 3d84b5067 PTE 0
[ 22.777109] Oops: 0000 [#5] SMP
[ 22.777332] CPU 3
[ 22.777399] Modules linked in: bridge stp xen_evtchn xenfs loop
snd_pcm snd_timer snd i2c_i801 soundcore snd_page_alloc i2c_core
pcspkr evdev joydev ghes video hed button processor ext4 mbcache jbd2
crc16 dm_mod raid1 md_mod usbhid hid sg sd_mod crc_t10dif ahci libahci
libata scsi_mod ehci_hcd fan thermal usbcore thermal_sys e1000e [last
unloaded: scsi_wait_scan]
[ 22.780506]
[ 22.780600] Pid: 2070, comm: forks Tainted: G D
3.0.0-1-amd64 #1 Intel Corporation S1200BTL/S1200BTL
[ 22.780933] RIP: e030:[<ffffffff810106db>] [<ffffffff810106db>]
__sanitize_i387_state+0x23/0xe1
[ 22.781141] RSP: e02b:ffff8803bc403e00 EFLAGS: 00010246
[ 22.781247] RAX: 0000000000000000 RBX: 00007fff10bfcdc0 RCX: 0000000000000200
[ 22.781359] RDX: ffff8803bb7c4e00 RSI: ffff8803bc403fd8 RDI: ffff8803bbd2ce20
[ 22.781472] RBP: ffff8803bbd2ce20 R08: ffff8803bc402000 R09: ffffffff81684640
[ 22.781584] R10: 00007f2f327999d0 R11: 0000000000000246 R12: 0000000000000000
[ 22.781696] R13: ffffffffffffffff R14: ffff8803bbd2ce20 R15: 00007fff10bfcdc0
[ 22.781809] FS: 00007f2f32799700(0000) GS:ffff8803d61a0000(0000)
knlGS:0000000000000000
[ 22.781952] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 22.782059] CR2: ffff8803bb7c5000 CR3: 00000003b7d28000 CR4: 0000000000002660
[ 22.782170] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 22.782283] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[ 22.782395] Process forks (pid: 2070, threadinfo ffff8803bc402000,
task ffff8803bbd2ce20)
[ 22.782537] Stack:
[ 22.782634] ffffffff81010919 0000000000413201 ffff8803bc403f58
0000000000000011
[ 22.783021] ffff8803bbd2d2b0 ffffffffffffffff ffffffff81008fdd
0000000000000000
[ 22.783408] 00007fff10bfcbf8 0000000000000011 0000000000040001
0000fffe00000817
[ 22.783795] Call Trace:
[ 22.783895] [<ffffffff81010919>] ? save_i387_xstate+0x102/0x1f3
[ 22.784004] [<ffffffff81008fdd>] ? do_signal+0x212/0x649
[ 22.784112] [<ffffffff8133733a>] ? error_exit+0x2a/0x60
[ 22.784219] [<ffffffff81336e61>] ? retint_restore_args+0x5/0x6
[ 22.784328] [<ffffffff8100122a>] ? hypercall_page+0x22a/0x1000
[ 22.784436] [<ffffffff81009450>] ? do_notify_resume+0x25/0x6b
[ 22.784545] [<ffffffff8133bfe0>] ? int_signal+0x12/0x17
[ 22.784652] Code: e8 13 2a ff ff 66 90 c3 48 8b 97 48 04 00 00 48
85 d2 0f 84 d0 00 00 00 48 8b 47 08 f6 40 14 01 74 02 0f 0b 48 8b 05
45 4e 71 00
[ 22.787445] 8b b2 00 02 00 00 48 89 c1 48 21 f1 48 39 c1 0f 84 a7 00 00
[ 22.788942] RIP [<ffffffff810106db>] __sanitize_i387_state+0x23/0xe1
[ 22.789115] RSP <ffff8803bc403e00>
[ 22.789215] CR2: ffff8803bb7c5000
[ 22.789315] ---[ end trace f589986fb387a3c6 ]---

grub boot options was:

menuentry 'Debian GNU/Linux, with Xen 4.0-amd64 and Linux
3.0.0-1-amd64' --class debian --class gnu-linux --class gnu --class os
--class xen {
insmod raid
insmod mdraid1x
insmod lvm
insmod part_msdos
insmod part_msdos
insmod ext2
set root='(xen-system)'
search --no-floppy --fs-uuid --set=root
709c172b-19b2-417d-8a43-e1957bcdc2f6
echo 'Loading Xen 4.0-amd64 ...'
multiboot /boot/xen-4.0-amd64.gz placeholder
echo 'Loading Linux 3.0.0-1-amd64 ...'
module /boot/vmlinuz-3.0.0-1-amd64 placeholder
root=/dev/mapper/xen-system ro xsave=0 quiet
echo 'Loading initial ramdisk ...'
module /boot/initrd.img-3.0.0-1-amd64
}

Rush.



--
To UNSUBSCRIBE, email to debian-kernel-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: CA+rvmv+yU0=nEuvLSqkE44RFqeaQw504MkD-sxjXV3D3nkme_g@mail.gmail.com">http://lists.debian.org/CA+rvmv+yU0=nEuvLSqkE44RFqeaQw504MkD-sxjXV3D3nkme_g@mail.gmail.com
 
Old 10-03-2011, 06:47 PM
Konrad Rzeszutek Wilk
 
Default Bug#642154: BUG: unable to handle kernel paging request at ffff8803bb6ad000

> echo 'Loading Xen 4.0-amd64 ...'
> multiboot /boot/xen-4.0-amd64.gz placeholder

Oops. I meant to try it in the hypervisor - so right after placeholder add "xsave=0"

> echo 'Loading Linux 3.0.0-1-amd64 ...'
> module /boot/vmlinuz-3.0.0-1-amd64 placeholder
> root=/dev/mapper/xen-system ro xsave=0 quiet





--
To UNSUBSCRIBE, email to debian-kernel-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: 20111003184722.GB15608@phenom.oracle.com">http://lists.debian.org/20111003184722.GB15608@phenom.oracle.com
 

Thread Tools




All times are GMT. The time now is 03:58 AM.

VBulletin, Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
Content Relevant URLs by vBSEO ©2007, Crawlability, Inc.
Copyright 2007 - 2008, www.linux-archive.org