[Bug 1429302] Re: General protection fault kernel message from qemu-system-x86

2015-03-06 Thread soonthor
** Attachment added: version.log
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1429302/+attachment/4336686/+files/version.log

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1429302

Title:
  General protection fault kernel message from  qemu-system-x86

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1429302/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1429302] Re: General protection fault kernel message from qemu-system-x86

2015-03-06 Thread soonthor
from ubuntu-bug linux

** Attachment added: apport.linux-image-3.13.0-32-generic.09a4b21l.apport
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1429302/+attachment/4336685/+files/apport.linux-image-3.13.0-32-generic.09a4b21l.apport

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1429302

Title:
  General protection fault kernel message from  qemu-system-x86

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1429302/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1429302] [NEW] General protection fault kernel message from qemu-system-x86

2015-03-06 Thread soonthor
Public bug reported:

Basically, the system completely logged up when this happened, we can see the 
following trace on the console. Then we reset the box. The logs below are from 
/var/log/kern.log
It's not reproducible at the moment. The issue happened when we tried to stop a 
VM (qemu-system-x86) hosted on the box via OpenNebula VM management web 
interface.

Is there a way to figure out if this is a known issue that fixed on
later kernel version?

root@node-101:~# cat /proc/version_signature 
Ubuntu 3.13.0-32.57-generic 3.13.11.4
root@node-101:~# cat /etc/issue
Ubuntu 14.04.1 LTS \n \l


Mar  5 15:29:22 node-101 kernel: [18293149.767254] general protection fault: 
 [#1] SMP 
Mar  5 15:29:22 node-101 kernel: [18293149.810640] Modules linked in: 
ipmi_devintf ipmi_si nfnetlink bluetooth ebtable_filter vhost_net vhost macvtap 
macvlan nbd ipt_MASQUERADE iptable_nat nf_nat_
ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack 
ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp ip6table_filter ip6_tables 
iptable_filter ip_tables ebtable_nat ebtables x_ta
bles bridge stp llc nfsd auth_rpcgss nfs_acl nfs lockd sunrpc fscache 
x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm crct10dif_pclmul 
crc32_pclmul ghash_clmulni_intel aesni_intel gpi
o_ich aes_x86_64 sb_edac lrw gf128mul edac_core glue_helper mei_me ablk_helper 
ioatdma mei joydev wmi cryptd lpc_ich mac_hid xfs libcrc32c lp parport raid10 
raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor raid6_pq raid0 multipath linear raid1 igb 
i2c_algo_bit isci dca hid_generic libsas usbhid ptp hid ahci libahci 
scsi_transport_sas pps_core [last unloaded: ipmi_si]
Mar  5 15:29:22 node-101 kernel: [18293150.361734] CPU: 18 PID: 16236 Comm: 
qemu-system-x86 Not tainted 3.13.0-32-generic #57-Ubuntu
Mar  5 15:29:22 node-101 kernel: [18293150.448654] Hardware name: Supermicro 
SYS-F627R3-RTB+/X9DRFR, BIOS 3.0a 01/29/2014
Mar  5 15:29:22 node-101 kernel: [18293150.539953] task: 881026eadfc0 ti: 
8813c7a84000 task.ti: 8813c7a84000
Mar  5 15:29:22 node-101 kernel: [18293150.629011] RIP: 
0010:[811a4383]  [811a4383] 
__kmalloc_node_track_caller+0x173/0x290
Mar  5 15:29:22 node-101 kernel: [18293150.740566] RSP: 0018:8813c7a85bb8  
EFLAGS: 00010246
Mar  5 15:29:22 node-101 kernel: [18293150.795788] RAX:  RBX: 
881dc796cd00 RCX: 012267b0
Mar  5 15:29:22 node-101 kernel: [18293150.904469] RDX: 012267af RSI: 
 RDI: 000172a0
Mar  5 15:29:22 node-101 kernel: [18293151.013444] RBP: 8813c7a85c00 R08: 
88207fcd72a0 R09: 88103f803500
Mar  5 15:29:22 node-101 kernel: [18293151.121781] R10: 88103f803500 R11: 
0293 R12: 000106d0
Mar  5 15:29:22 node-101 kernel: [18293151.230534] R13: 02c0 R14: 
2d70757465732220 R15: 
Mar  5 15:29:22 node-101 kernel: [18293151.337326] FS:  7f772b0ab980() 
GS:88207fcc() knlGS:
Mar  5 15:29:22 node-101 kernel: [18293151.441748] CS:  0010 DS:  ES:  
CR0: 80050033
Mar  5 15:29:22 node-101 kernel: [18293151.484866] CR2: 7f747360 CR3: 
002015c11000 CR4: 001427e0
Mar  5 15:29:22 node-101 kernel: [18293151.569286] Stack:
Mar  5 15:29:22 node-101 kernel: [18293151.613617]  8820217c9808 
880b 88103f803500 81610e7e
Mar  5 15:29:22 node-101 kernel: [18293151.717684]  881dc796cd00 
8813c7a85c5f 04d0 02c0
Mar  5 15:29:22 node-101 kernel: [18293151.818459]   
8813c7a85c40 816104f1 81610e4e
Mar  5 15:29:22 node-101 kernel: [18293151.923644] Call Trace:
Mar  5 15:29:22 node-101 kernel: [18293151.974362]  [81610e7e] ? 
__alloc_skb+0x7e/0x2b0
Mar  5 15:29:22 node-101 kernel: [18293152.025346]  [816104f1] 
__kmalloc_reserve.isra.25+0x31/0x90
Mar  5 15:29:22 node-101 kernel: [18293152.073995]  [81610e4e] ? 
__alloc_skb+0x4e/0x2b0
Mar  5 15:29:22 node-101 kernel: [18293152.123817]  [81610e7e] 
__alloc_skb+0x7e/0x2b0
Mar  5 15:29:22 node-101 kernel: [18293152.171263]  [8160beda] 
sock_alloc_send_pskb+0x1aa/0x3e0
Mar  5 15:29:22 node-101 kernel: [18293152.216564]  [816b6bcf] 
unix_stream_sendmsg+0x26f/0x400
Mar  5 15:29:22 node-101 kernel: [18293152.262179]  [81606b9e] 
sock_aio_write+0xfe/0x130
Mar  5 15:29:22 node-101 kernel: [18293152.308666]  [811bc3da] 
do_sync_write+0x5a/0x90
Mar  5 15:29:22 node-101 kernel: [18293152.354563]  [811bcc5d] 
vfs_write+0x1ad/0x1f0
Mar  5 15:29:22 node-101 kernel: [18293152.398450]  [811bd599] 
SyS_write+0x49/0xa0
Mar  5 15:29:22 node-101 kernel: [18293152.440496]  [8172c87f] 
tracesys+0xe1/0xe6
Mar  5 15:29:22 node-101 kernel: [18293152.480144] Code: 4c 89 cf 44 89 e6 4c 
89 4d c8 e8 69 a3 00 00 4c 8b 4d c8 49 89 c2 e9 01 ff ff ff 0f 1f 44 00 00 49 
63 42 20 48 8d 4a 01 49 8b 3a 49 8b 

[Bug 1429302] Re: General protection fault kernel message from qemu-system-x86

2015-03-06 Thread soonthor
** Attachment added: lspci-vnvn.log
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1429302/+attachment/4336687/+files/lspci-vnvn.log

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1429302

Title:
  General protection fault kernel message from  qemu-system-x86

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1429302/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs