Your message dated Sun, 09 May 2021 07:38:23 -0700 (PDT)
with message-id <6097f3df.1c69fb81.1130.3...@mx.google.com>
and subject line Closing this bug (BTS maintenance for src:linux bugs)
has caused the Debian Bug report #815737,
regarding linux-images bug
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
815737: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815737
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: linux
Version: 3.16.7-ckt11-1+deb8u3

using this kernel, we are facing kernel panic normally.

the call trace information : ( jessie: 8.2 )

[2973074.796563] general protection fault: 0000 [#1] SMP
[2973074.796818] Modules linked in: nls_utf8 btrfs xor raid6_pq
hfsplus xfs libcrc32c dm_mod cdc_ether usbnet mii joydev hid_generic
usbhid hid 8021q garp stp mrp llc x86_pkg_temp_thermal
intel_powerclamp intel_rapl coretemp kvm_intel kvm crc32_pclmul
ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper
ablk_helper evdev cryptd ttm drm_kms_helper drm iTCO_wdt
iTCO_vendor_support lpc_ich dcdbas mei_me pcspkr mfd_core mei
ipmi_watchdog processor thermal_sys acpi_power_meter shpchp wmi button
ipmi_si ipmi_poweroff ipmi_devintf ipmi_msghandler autofs4 ext4 crc16
mbcache jbd2 sg sd_mod crc_t10dif crct10dif_generic crct10dif_pclmul
crct10dif_common crc32c_intel ehci_pci igb i2c_algo_bit ehci_hcd ixgbe
i2c_core megaraid_sas dca usbcore ptp pps_core usb_common mdio
scsi_mod
[2973074.803401] CPU: 28 PID: 248515 Comm: java Not tainted
3.16.0-4-amd64 #1 Debian 3.16.7-ckt11-1+deb8u3
[2973074.803540] Hardware name: Dell Inc. PowerEdge R730xd/0H21J3,
BIOS 1.5.4 10/002/2015
[2973074.803675] task: ffff881b21a16c60 ti: ffff880054778000 task.ti:
ffff880054778000
[2973074.803808] RIP: 0010:[<ffffffff8151106b>]  [<ffffffff8151106b>]
_raw_spin_lock_irqsave+0x1b/0x50
[2973074.804022] RSP: 0018:ffff88005477b930  EFLAGS: 00010046
[2973074.804129] RAX: 0000000000000046 RBX: ffffea0003fc1670 RCX:
0000000000000001
[2973074.804262] RDX: 0000000000010000 RSI: 0000000000000046 RDI:
3e0e0ba50e1f7b26
[2973074.804395] RBP: 3e0e0ba50e1f7b0e R08: ffff88005477ba98 R09:
000000000000091b
[2973074.804528] R10: 0000000000003605 R11: ffffffffffffffaa R12:
3e0e0ba50e1f7b26
[2973074.804660] R13: 0000000000123800 R14: ffff88187fffbe00 R15:
0000000000000001
[2973074.804794] FS:  00007f8eac579700(0000) GS:ffff88187f5c0000(0000)
knlGS:0000000000000000
[2973074.804929] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[2973074.805037] CR2: 00000000ee2c5000 CR3: 0000000334ce3000 CR4:
00000000001407e0
[2973074.805169] Stack:
[2973074.805268]  ffffffff81160977 0000000000123742 ffffea0003fc1670
0000000000000143
[2973074.805689]  ffffffff8115fc9e ffffea0003fbd000 ffff88005477ba40
000000000000091b
[2973074.806110]  ffff88005477bfd8 0000000000000000 0000000000000000
000000000000091b
[2973074.806532] Call Trace:
[2973074.806637]  [<ffffffff81160977>] ? balloon_page_isolate+0x97/0x110
[2973074.806749]  [<ffffffff8115fc9e>] ? isolate_migratepages_range+0x89e/0x8c0
[2973074.806861]  [<ffffffff8115ff8d>] ? compact_zone+0x22d/0x4a0
[2973074.806970]  [<ffffffff8116028e>] ? compact_zone_order+0x8e/0xd0
[2973074.807080]  [<ffffffff81160535>] ? try_to_compact_pages+0xc5/0xf0
[2973074.807191]  [<ffffffff8150942a>] ? __alloc_pages_direct_compact+0xab/0x1a3
[2973074.807305]  [<ffffffff81146953>] ? __alloc_pages_nodemask+0x8b3/0xb30
[2973074.807418]  [<ffffffff81185d0d>] ? alloc_pages_current+0x9d/0x150
[2973074.807530]  [<ffffffff8140763f>] ? skb_page_frag_refill+0x5f/0xb0
[2973074.807641]  [<ffffffff81408109>] ? sk_page_frag_refill+0x19/0x70
[2973074.807752]  [<ffffffff814627d5>] ? tcp_sendmsg+0x265/0xd20
[2973074.807861]  [<ffffffff814030b6>] ? sock_aio_write+0xf6/0x120
[2973074.807970]  [<ffffffff814031de>] ? sock_aio_read.part.7+0xfe/0x120
[2973074.808083]  [<ffffffff811a794c>] ? do_sync_write+0x5c/0x90
[2973074.808193]  [<ffffffff811a8335>] ? vfs_write+0x195/0x1f0
[2973074.808301]  [<ffffffff811a811d>] ? vfs_read+0xed/0x170
[2973074.808457]  [<ffffffff811a8d92>] ? SyS_write+0x42/0xa0
[2973074.808566]  [<ffffffff8151158d>] ? system_call_fast_compare_end+0x10/0x15
[2973074.808677] Code: eb f2 66 66 66 66 66 2e 0f 1f 84 00 00 00 00 00
0f 1f 44 00 00 9c 58 0f 1f 44 00 00 48 89 c6 fa 66 0f 1f 44 00 00 ba
00 00 01 00 <f0> 0f c1 17 89 d1 c1 e9 10 66 39 d1 89 c8 75 04 48 89 f0
c3 0f
[2973074.813557] RIP  [<ffffffff8151106b>] _raw_spin_lock_irqsave+0x1b/0x50
[2973074.813741]  RSP <ffff88005477b930>


BRs

yongsu

--- End Message ---
--- Begin Message ---
Hi

This bug was filed for a very old kernel or the bug is old itself
without resolution.

If you can reproduce it with

- the current version in unstable/testing
- the latest kernel from backports

please reopen the bug, see https://www.debian.org/Bugs/server-control
for details.

Regards,
Salvatore

--- End Message ---

Reply via email to