Re: REGRESSION: RIP: 0010:skb_release_data+0xb8/0x1e0 in vhost/tun

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Jason,

On Fri, Mar 22, 2024 at 6:31 AM Jason Wang <jasowang@xxxxxxxxxx> wrote:
>
> On Thu, Mar 21, 2024 at 5:44 PM Igor Raits <igor@xxxxxxxxxxxx> wrote:
> >
> > Hello Jason & others,
> >
> > On Wed, Mar 20, 2024 at 10:33 AM Jason Wang <jasowang@xxxxxxxxxx> wrote:
> > >
> > > On Tue, Mar 19, 2024 at 9:15 PM Igor Raits <igor@xxxxxxxxxxxx> wrote:
> > > >
> > > > Hello Stefan,
> > > >
> > > > On Tue, Mar 19, 2024 at 2:12 PM Stefan Hajnoczi <stefanha@xxxxxxxxxx> wrote:
> > > > >
> > > > > On Tue, Mar 19, 2024 at 10:00:08AM +0100, Igor Raits wrote:
> > > > > > Hello,
> > > > > >
> > > > > > We have started to observe kernel crashes on 6.7.y kernels (atm we
> > > > > > have hit the issue 5 times on 6.7.5 and 6.7.10). On 6.6.9 where we
> > > > > > have nodes of cluster it looks stable. Please see stacktrace below. If
> > > > > > you need more information please let me know.
> > > > > >
> > > > > > We do not have a consistent reproducer but when we put some bigger
> > > > > > network load on a VM, the hypervisor's kernel crashes.
> > > > > >
> > > > > > Help is much appreciated! We are happy to test any patches.
> > > > >
> > > > > CCing Michael Tsirkin and Jason Wang for vhost_net.
> > > > >
> > > > > >
> > > > > > [62254.167584] stack segment: 0000 [#1] PREEMPT SMP NOPTI
> > > > > > [62254.173450] CPU: 63 PID: 11939 Comm: vhost-11890 Tainted: G
> > > > > >    E      6.7.10-1.gdc.el9.x86_64 #1
> > > > >
> > > > > Are there any patches in this kernel?
> > > >
> > > > Only one, unrelated to this part. Removal of pr_err("EEVDF scheduling
> > > > fail, picking leftmost\n"); line (reported somewhere few months ago
> > > > and it was suggested workaround until proper solution comes).
> > >
> > > Btw, a bisection would help as well.
> >
> > In the end it seems like we don't really have "stable" setup, so
> > bisection looks to be useless but we did find few things meantime:
> >
> > 1. On 6.6.9 it crashes either with unexpected GSO type or usercopy:
> > Kernel memory exposure attempt detected from SLUB object
> > 'skbuff_head_cache'
>
> Do you have a full calltrace for this?

I have shared it in one of the messages in this thread.
https://marc.info/?l=linux-virtualization&m=171085443512001&w=2

> > 2. On 6.7.5, 6.7.10 and 6.8.1 it crashes with RIP:
> > 0010:skb_release_data+0xb8/0x1e0
>
> And for this?

https://marc.info/?l=linux-netdev&m=171083870801761&w=2

> > 3. It does NOT crash on 6.8.1 when VM does not have multi-queue setup
> >
> > Looks like the multi-queue setup (we have 2 interfaces × 3 virtio
> > queues for each) is causing problems as if we set only one queue for
> > each interface the issue is gone.
> > Maybe there is some race condition in __pfx_vhost_task_fn+0x10/0x10 or
> > somewhere around?
>
> I can't tell now, but it seems not because if we have 3 queue pairs we
> will have 3 vhost threads.
>
> > We have noticed that there are 3 of such functions
> > in the stacktrace that gave us hints about what we could try…
>
> Let's try to enable SLUB_DEBUG and KASAN to see if we can get
> something interesting.

We were able to reproduce it even with 1 vhost queue... And now we
have slub_debug + kasan so I hopefully have more useful data for you
now.
I have attached it for better readability.

Thanks!
cmp0220 login: [  673.018736] perf: interrupt took too long (2503 > 2500), lowering kernel.perf_event_max_sample_rate to 79000
[  905.913602] tun: Universal TUN/TAP device driver, 1.6
[  905.922523] brqf5da63bf-9a: port 1(tap07736b53-0b) entered blocking state
[  905.929427] brqf5da63bf-9a: port 1(tap07736b53-0b) entered disabled state
[  905.936288] tap07736b53-0b: entered allmulticast mode
[  905.941869] tap07736b53-0b: entered promiscuous mode
[  905.947932] brqf5da63bf-9a: port 1(tap07736b53-0b) entered blocking state
[  905.954795] brqf5da63bf-9a: port 1(tap07736b53-0b) entered forwarding state
[  906.012320] brqfd2aebce-2e: port 1(tape61d8e94-b9) entered blocking state
[  906.019228] brqfd2aebce-2e: port 1(tape61d8e94-b9) entered disabled state
[  906.026080] tape61d8e94-b9: entered allmulticast mode
[  906.033505] tape61d8e94-b9: entered promiscuous mode
[  906.039472] brqfd2aebce-2e: port 1(tape61d8e94-b9) entered blocking state
[  906.046324] brqfd2aebce-2e: port 1(tape61d8e94-b9) entered forwarding state
[  906.881154] brqf5da63bf-9a: port 2(bond0.711) entered blocking state
[  906.887611] brqf5da63bf-9a: port 2(bond0.711) entered disabled state
[  906.894061] bond0.711: entered allmulticast mode
[  906.899239] bond0.711: entered promiscuous mode
[  906.904958] brqf5da63bf-9a: port 2(bond0.711) entered blocking state
[  906.911367] brqf5da63bf-9a: port 2(bond0.711) entered forwarding state

cmp0220 login: 
cmp0220 login: 
cmp0220 login: [  908.571260] brqfd2aebce-2e: port 2(bond0.700) entered blocking state
[  908.577691] brqfd2aebce-2e: port 2(bond0.700) entered disabled state
[  908.584186] bond0.700: entered allmulticast mode
[  908.589575] bond0.700: entered promiscuous mode
[  908.594579] brqfd2aebce-2e: port 2(bond0.700) entered blocking state
[  908.601442] brqfd2aebce-2e: port 2(bond0.700) entered forwarding state
[  944.310935] brqf5da63bf-9a: port 3(tapd18e017d-f0) entered blocking state
[  944.318255] brqf5da63bf-9a: port 3(tapd18e017d-f0) entered disabled state
[  944.325566] tapd18e017d-f0: entered allmulticast mode
[  944.331738] tapd18e017d-f0: entered promiscuous mode
[  944.338187] brqf5da63bf-9a: port 3(tapd18e017d-f0) entered blocking state
[  944.345689] brqf5da63bf-9a: port 3(tapd18e017d-f0) entered forwarding state
[  944.386641] brqfd2aebce-2e: port 3(tap01bbfc9f-e4) entered blocking state
[  944.393932] brqfd2aebce-2e: port 3(tap01bbfc9f-e4) entered disabled state
[  944.401313] tap01bbfc9f-e4: entered allmulticast mode
[  944.407819] tap01bbfc9f-e4: entered promiscuous mode
[  944.414431] brqfd2aebce-2e: port 3(tap01bbfc9f-e4) entered blocking state
[  944.421799] brqfd2aebce-2e: port 3(tap01bbfc9f-e4) entered forwarding state

cmp0220 login: 
cmp0220 login: 
cmp0220 login: 
cmp0220 login: [  956.794495] brqfd2aebce-2e: port 3(tap01bbfc9f-e4) entered disabled state
[  956.805423] tap01bbfc9f-e4 (unregistering): left allmulticast mode
[  956.812555] tap01bbfc9f-e4 (unregistering): left promiscuous mode
[  956.819402] brqfd2aebce-2e: port 3(tap01bbfc9f-e4) entered disabled state
[  956.861804] brqf5da63bf-9a: port 3(tapd18e017d-f0) entered disabled state
[  956.869911] tapd18e017d-f0 (unregistering): left allmulticast mode
[  956.876562] tapd18e017d-f0 (unregistering): left promiscuous mode
[  956.883126] brqf5da63bf-9a: port 3(tapd18e017d-f0) entered disabled state
[ 1056.270117] brqf5da63bf-9a: port 3(tapd18e017d-f0) entered blocking state
[ 1056.277499] brqf5da63bf-9a: port 3(tapd18e017d-f0) entered disabled state
[ 1056.284753] tapd18e017d-f0: entered allmulticast mode
[ 1056.291061] tapd18e017d-f0: entered promiscuous mode
[ 1056.297223] brqf5da63bf-9a: port 3(tapd18e017d-f0) entered blocking state
[ 1056.304527] brqf5da63bf-9a: port 3(tapd18e017d-f0) entered forwarding state
[ 1056.343876] brqfd2aebce-2e: port 3(tap01bbfc9f-e4) entered blocking state
[ 1056.351076] brqfd2aebce-2e: port 3(tap01bbfc9f-e4) entered disabled state
[ 1056.358841] tap01bbfc9f-e4: entered allmulticast mode
[ 1056.364645] tap01bbfc9f-e4: entered promiscuous mode
[ 1056.370601] brqfd2aebce-2e: port 3(tap01bbfc9f-e4) entered blocking state
[ 1056.377799] brqfd2aebce-2e: port 3(tap01bbfc9f-e4) entered forwarding state

cmp0220 login: 
cmp0220 login: 
cmp0220 login: [ 1339.821946] systemd-journald[1873]: Data hash table of /run/log/journal/ecd10828def34e4d93adc83211012bf3/system.journal has a fill level at 75.0 (17071 of 22755 items, 8388608 file size, 491 bytes per hash table item), suggesting rotation.
[ 1339.844609] systemd-journald[1873]: /run/log/journal/ecd10828def34e4d93adc83211012bf3/system.journal: Journal header limits reached or header out-of-date, rotating.

cmp0220 login: 
cmp0220 login: 
cmp0220 login: 
cmp0220 login: 
cmp0220 login: [ 1367.335154] ==================================================================
[ 1367.342911] BUG: KASAN: use-after-free in _copy_to_iter+0x378/0x10b0
[ 1367.349749] Read of size 3006 at addr ffff88b07d92c102 by task vhost-18439/18512
[ 1367.357635] 
[ 1367.359602] CPU: 5 PID: 18512 Comm: vhost-18439 Tainted: G            E      6.8.1-1.gdc.el9.kasan.x86_64 #1
[ 1367.369907] Hardware name: Dell Inc. PowerEdge R7525/0H3K7P, BIOS 2.14.1 12/17/2023
[ 1367.378040] Call Trace:
[ 1367.380970]  <TASK>
[ 1367.383549]  dump_stack_lvl+0x33/0x50
[ 1367.387694]  print_address_description.constprop.0+0x2c/0x3e0
[ 1367.393918]  ? _copy_to_iter+0x378/0x10b0
[ 1367.398418]  print_report+0xb5/0x270
[ 1367.402470]  ? kasan_addr_to_slab+0x9/0xa0
[ 1367.407050]  kasan_report+0xac/0xe0
[ 1367.411011]  ? _copy_to_iter+0x378/0x10b0
[ 1367.415498]  kasan_check_range+0x35/0x1b0
[ 1367.419980]  _copy_to_iter+0x378/0x10b0
[ 1367.424285]  ? kasan_save_stack+0x30/0x40
[ 1367.428769]  ? kasan_save_stack+0x20/0x40
[ 1367.433251]  ? kasan_save_track+0x10/0x30
[ 1367.437722]  ? kasan_save_free_info+0x37/0x60
[ 1367.442533]  ? poison_slab_object+0x106/0x190
[ 1367.447339]  ? __pfx__copy_to_iter+0x10/0x10
[ 1367.452063]  ? tun_recvmsg+0x10b/0x380 [tun]
[ 1367.456790]  ? check_heap_object+0x27d/0x4b0
[ 1367.461508]  ? ret_from_fork_asm+0x1b/0x30
[ 1367.466059]  ? __check_object_size.part.0+0x66/0x1c0
[ 1367.471474]  __skb_datagram_iter+0x405/0x8f0
[ 1367.476198]  ? __pfx_simple_copy_to_iter+0x10/0x10
[ 1367.481433]  skb_copy_datagram_iter+0x38/0x100
[ 1367.486324]  tun_put_user.constprop.0+0x440/0xba0 [tun]
[ 1367.491998]  ? __pfx_vhost_get_vq_desc+0x10/0x10 [vhost]
[ 1367.497774]  ? __pfx_tun_put_user.constprop.0+0x10/0x10 [tun]
[ 1367.503975]  tun_do_read+0xba/0x3d0 [tun]
[ 1367.508444]  ? __pfx_tun_do_read+0x10/0x10 [tun]
[ 1367.513518]  ? __pfx__copy_to_iter+0x10/0x10
[ 1367.518241]  ? __pfx_get_rx_bufs+0x10/0x10 [vhost_net]
[ 1367.523836]  ? vhost_net_buf_peek+0x448/0x6f0 [vhost_net]
[ 1367.529687]  tun_recvmsg+0x10b/0x380 [tun]
[ 1367.534254]  handle_rx+0x81d/0x1120 [vhost_net]
[ 1367.539243]  ? __pfx_handle_rx+0x10/0x10 [vhost_net]
[ 1367.544669]  ? __schedule+0x6cd/0x1760
[ 1367.548873]  ? mutex_unlock+0x80/0xd0
[ 1367.552994]  ? __pfx_mutex_unlock+0x10/0x10
[ 1367.557615]  vhost_worker+0xcb/0x110 [vhost]
[ 1367.562318]  vhost_task_fn+0x114/0x250
[ 1367.566484]  ? __pfx_vhost_task_fn+0x10/0x10
[ 1367.571147]  ? _raw_spin_lock_irq+0x82/0xe0
[ 1367.575713]  ? __pfx__raw_spin_lock_irq+0x10/0x10
[ 1367.580797]  ? finish_task_switch.isra.0+0x1b3/0x720
[ 1367.586141]  ? __pfx_vhost_task_fn+0x10/0x10
[ 1367.590780]  ret_from_fork+0x2d/0x70
[ 1367.594716]  ? __pfx_vhost_task_fn+0x10/0x10
[ 1367.599338]  ret_from_fork_asm+0x1b/0x30
[ 1367.603603]  </TASK>
[ 1367.606136] 
[ 1367.607970] The buggy address belongs to the physical page:
[ 1367.613888] page:ffffea00c1f64b00 refcount:65535 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x307d92c
[ 1367.624079] head:ffffea00c1f64b00 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 1367.632534] flags: 0x97ffffc0000040(head|node=2|zone=2|lastcpupid=0x1fffff)
[ 1367.639865] page_type: 0xffffffff()
[ 1367.643731] raw: 0097ffffc0000040 0000000000000000 dead000000000122 0000000000000000
[ 1367.651857] raw: 0000000000000000 0000000000000000 0000ffffffffffff 0000000000000000
[ 1367.659979] page dumped because: kasan: bad access detected
[ 1367.665941] 
[ 1367.667825] Memory state around the buggy address:
[ 1367.673025]  ffff88b07d92c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 1367.680655]  ffff88b07d92c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 1367.688277] >ffff88b07d92c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 1367.695901]                    ^
[ 1367.699531]  ffff88b07d92c180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 1367.707161]  ffff88b07d92c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 1367.714792] ==================================================================
[ 1367.722460] Disabling lock debugging due to kernel taint
[ 1369.686357] usercopy: Kernel memory exposure attempt detected from SLUB object 'skbuff_ext_cache' (offset 128, size 3072)!
[ 1369.698318] ------------[ cut here ]------------
[ 1369.703568] kernel BUG at mm/usercopy.c:102!
[ 1369.708421] invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI
[ 1369.714694] CPU: 89 PID: 20746 Comm: vhost-20705 Tainted: G    B       E      6.8.1-1.gdc.el9.kasan.x86_64 #1
[ 1369.725117] Hardware name: Dell Inc. PowerEdge R7525/0H3K7P, BIOS 2.14.1 12/17/2023
[ 1369.733284] RIP: 0010:usercopy_abort+0x6a/0x80
[ 1369.738239] Code: 18 bc ab 50 48 c7 c2 40 18 bc ab 57 48 c7 c7 40 19 bc ab 48 0f 44 d6 48 c7 c6 80 18 bc ab 4c 89 d1 49 0f 44 f3 e8 96 48 8a ff <0f> 0b 49 c7 c1 c0 17 bc ab 4c 89 cf 4d 89 c8 eb a9 0f 1f 44 00 00
[ 1369.758000] RSP: 0018:ffff8990103b7830 EFLAGS: 00010246
[ 1369.763746] RAX: 000000000000006e RBX: 0000000000000080 RCX: ffffffffaa2c62ba
[ 1369.771400] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8990103b7658
[ 1369.779052] RBP: 0000000000000c00 R08: 0000000000000001 R09: ffffed3202076ecb
[ 1369.786697] R10: ffff8990103b765f R11: ffff88801c5c6fb4 R12: ffff88d002e32680
[ 1369.794340] R13: 0000000000000001 R14: 0000000000002336 R15: ffff8990103b7d38
[ 1369.802020] FS:  00007fc7b8c54f80(0000) GS:ffff89dfbfc80000(0000) knlGS:0000000000000000
[ 1369.810626] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1369.816895] CR2: 000000c0f2b8a000 CR3: 000001100920a002 CR4: 0000000000770ef0
[ 1369.824551] PKRU: 55555554
[ 1369.827786] Call Trace:
[ 1369.830759]  <TASK>
[ 1369.833383]  ? die+0x33/0x90
[ 1369.836795]  ? do_trap+0x19a/0x250
[ 1369.840718]  ? usercopy_abort+0x6a/0x80
[ 1369.845066]  ? do_error_trap+0x8a/0xf0
[ 1369.849326]  ? usercopy_abort+0x6a/0x80
[ 1369.853676]  ? handle_invalid_op+0x2c/0x40
[ 1369.858272]  ? usercopy_abort+0x6a/0x80
[ 1369.862658]  ? exc_invalid_op+0x2b/0x50
[ 1369.867020]  ? asm_exc_invalid_op+0x16/0x20
[ 1369.871711]  ? llist_add_batch+0xba/0x130
[ 1369.876253]  ? usercopy_abort+0x6a/0x80
[ 1369.880571]  __check_heap_object+0xd5/0x110
[ 1369.885238]  __check_object_size.part.0+0x66/0x1c0
[ 1369.890501]  simple_copy_to_iter+0x26/0x50
[ 1369.895072]  __skb_datagram_iter+0xf8/0x8f0
[ 1369.899725]  ? __pfx__copy_to_iter+0x10/0x10
[ 1369.904456]  ? translate_desc+0xe7/0x3e0 [vhost]
[ 1369.909537]  ? __pfx_simple_copy_to_iter+0x10/0x10
[ 1369.914788]  skb_copy_datagram_iter+0x38/0x100
[ 1369.919686]  tun_put_user.constprop.0+0x440/0xba0 [tun]
[ 1369.925376]  ? __pfx_vhost_get_vq_desc+0x10/0x10 [vhost]
[ 1369.931162]  ? __pfx_tun_put_user.constprop.0+0x10/0x10 [tun]
[ 1369.937374]  tun_do_read+0xba/0x3d0 [tun]
[ 1369.941846]  ? __pfx_tun_do_read+0x10/0x10 [tun]
[ 1369.946934]  ? __pfx__copy_to_iter+0x10/0x10
[ 1369.951667]  ? __pfx_get_rx_bufs+0x10/0x10 [vhost_net]
[ 1369.957260]  tun_recvmsg+0x10b/0x380 [tun]
[ 1369.961805]  handle_rx+0x81d/0x1120 [vhost_net]
[ 1369.966768]  ? __pfx_handle_rx+0x10/0x10 [vhost_net]
[ 1369.972160]  ? __schedule+0x6cd/0x1760
[ 1369.976345]  ? mutex_unlock+0x80/0xd0
[ 1369.980430]  ? __pfx_mutex_unlock+0x10/0x10
[ 1369.985027]  vhost_worker+0xcb/0x110 [vhost]
[ 1369.989701]  vhost_task_fn+0x114/0x250
[ 1369.993835]  ? __pfx_vhost_task_fn+0x10/0x10
[ 1369.998470]  ? _raw_spin_lock_irq+0x82/0xe0
[ 1370.003017]  ? __pfx__raw_spin_lock_irq+0x10/0x10
[ 1370.008078]  ? finish_task_switch.isra.0+0x1b3/0x720
[ 1370.013403]  ? __pfx_vhost_task_fn+0x10/0x10
[ 1370.018028]  ret_from_fork+0x2d/0x70
[ 1370.021960]  ? __pfx_vhost_task_fn+0x10/0x10
[ 1370.026584]  ret_from_fork_asm+0x1b/0x30
[ 1370.030862]  </TASK>
[ 1370.033382] Modules linked in: nf_conntrack_netlink(E) ebt_arp(E) nft_meta_bridge(E) xt_CT(E) xt_mac(E) xt_set(E) xt_conntrack(E) xt_comment(E) xt_physdev(E) nft_compat(E) ip_set_hash_net(E) ip_set(E) vhost_net(E) vhost(E) vhost_iotlb(E) tap(E) tun(E) rpcsec_gss_krb5(E) auth_rpcgss(E) nfsv4(E) dns_resolver(E) nfs(E) lockd(E) grace(E) netfs(E) netconsole(E) ib_core(E) scsi_transport_iscsi(E) nf_tables(E) nfnetlink(E) target_core_mod(E) macvlan(E) 8021q(E) garp(E) mrp(E) bonding(E) tls(E) binfmt_misc(E) dell_rbu(E) sunrpc(E) vfat(E) fat(E) dm_service_time(E) dm_multipath(E) ipmi_ssif(E) btrfs(E) intel_rapl_msr(E) intel_rapl_common(E) xor(E) amd64_edac(E) zstd_compress(E) dell_smbios(E) edac_mce_amd(E) kvm_amd(E) raid6_pq(E) dell_wmi_descriptor(E) wmi_bmof(E) dcdbas(E) kvm(E) irqbypass(E) mgag200(E) i2c_algo_bit(E) rapl(E) acpi_cpufreq(E) ptdma(E) acpi_ipmi(E) i2c_piix4(E) k10temp(E) wmi(E) ipmi_si(E) ipmi_devintf(E) ipmi_msghandler(E) acpi_power_meter(E) fuse(E) zram(E) ext4(E) mbcache(E) jbd2(E) dm_crypt(E) sd_mod(E)
[ 1370.033475]  t10_pi(E) sg(E) crct10dif_pclmul(E) crc32_pclmul(E) polyval_clmulni(E) ahci(E) polyval_generic(E) libahci(E) ghash_clmulni_intel(E) ice(E) sha512_ssse3(E) libata(E) ccp(E) gnss(E) megaraid_sas(E) sp5100_tco(E) dm_mirror(E) dm_region_hash(E) dm_log(E) dm_mod(E) nf_conntrack(E) libcrc32c(E) crc32c_intel(E) nf_defrag_ipv6(E) nf_defrag_ipv4(E) br_netfilter(E) bridge(E) stp(E) llc(E)
[ 1370.127042] Unloaded tainted modules: fjes(E):2 padlock_aes(E):3
[ 1370.170306] ---[ end trace 0000000000000000 ]---
[ 1370.231095] pstore: backend (erst) writing error (-22)
[ 1370.236814] RIP: 0010:usercopy_abort+0x6a/0x80
[ 1370.241826] Code: 18 bc ab 50 48 c7 c2 40 18 bc ab 57 48 c7 c7 40 19 bc ab 48 0f 44 d6 48 c7 c6 80 18 bc ab 4c 89 d1 49 0f 44 f3 e8 96 48 8a ff <0f> 0b 49 c7 c1 c0 17 bc ab 4c 89 cf 4d 89 c8 eb a9 0f 1f 44 00 00
[ 1370.261760] RSP: 0018:ffff8990103b7830 EFLAGS: 00010246
[ 1370.267600] RAX: 000000000000006e RBX: 0000000000000080 RCX: ffffffffaa2c62ba
[ 1370.275353] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8990103b7658
[ 1370.283101] RBP: 0000000000000c00 R08: 0000000000000001 R09: ffffed3202076ecb
[ 1370.290847] R10: ffff8990103b765f R11: ffff88801c5c6fb4 R12: ffff88d002e32680
[ 1370.298596] R13: 0000000000000001 R14: 0000000000002336 R15: ffff8990103b7d38
[ 1370.306354] FS:  00007fc7b8c54f80(0000) GS:ffff89dfbfc80000(0000) knlGS:0000000000000000
[ 1370.315067] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1370.321439] CR2: 000000c0f2b8a000 CR3: 000001100920a002 CR4: 0000000000770ef0
[ 1370.329204] PKRU: 55555554
[ 1370.332543] Kernel panic - not syncing: Fatal exception
[ 1370.476941] Kernel Offset: 0x28200000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)

[Index of Archives]     [KVM Development]     [Libvirt Development]     [Libvirt Users]     [CentOS Virtualization]     [Netdev]     [Ethernet Bridging]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Bugtraq]     [Yosemite Forum]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux Admin]     [Samba]

  Powered by Linux