Bug 29838 - Kernel wirft beim Boot unter Amazon EC2 Trace
Kernel wirft beim Boot unter Amazon EC2 Trace
Status: RESOLVED DUPLICATE of bug 30369
Product: UCS
Classification: Unclassified
Component: Kernel
UCS 3.1
Other Linux
: P5 normal (vote)
: ---
Assigned To: Kernel maintainers
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2012-12-14 21:06 CET by Ingo Steuwer
Modified: 2013-02-12 09:35 CET (History)
1 user (show)

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Ingo Steuwer univentionstaff 2012-12-14 21:06:28 CET
Ca. eine Minute nach dem Boot wirft der Kernel in einer Amazon EC2-Instanz einen Trace. Die Instanz wurde aus der UCS 3.0 Amazon Appliance generiert und auf UCS 3.1 aktualisiert. Beobachtet auf zwei unterschiedlichen Maschinen.

Linux dc01 3.2.0-ucs17-amd64 #1 SMP Debian 3.2.30-1.17.201210041157 x86_64 GNU/Linux

Evtl. steht das im Zusammenhang mit Bug #29837


Dec 14 20:50:31 dc01 kernel: [2005065.352706] alignment check: 0000 [#1] SMP 
Dec 14 20:50:31 dc01 kernel: [2005065.352710] CPU 0 
Dec 14 20:50:31 dc01 kernel: [2005065.352712] Modules linked in: nfsd lockd nfs_acl auth_rpcgss sunrpc ipt_MASQUERADE ip6t_REJECT ipt_REJECT xt_tcpudp nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_mangle ip6table_filter ip6_tables xt_state iptable_mangle iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4 iptable_filter ip_tables x_tables quota_v2 quota_tree evdev crc32c_intel ghash_clmulni_intel snd_pcm snd_timer snd soundcore snd_page_alloc aesni_intel cryptd aes_x86_64 pcspkr aes_generic ext3 jbd dm_snapshot dm_mirror dm_region_hash dm_log dm_mod xen_blkfront xen_netfront [last unloaded: scsi_wait_scan]
Dec 14 20:50:31 dc01 kernel: [2005065.352747] 
Dec 14 20:50:31 dc01 kernel: [2005065.352750] Pid: 1341, comm: hald Not tainted 3.2.0-ucs17-amd64 #1 Debian 3.2.30-1.17.201210041157  
Dec 14 20:50:31 dc01 kernel: [2005065.352754] RIP: e030:[<ffffffff8100e19f>]  [<ffffffff8100e19f>] do_signal+0x28c/0x635
Dec 14 20:50:31 dc01 kernel: [2005065.352765] RSP: e02b:ffff880065857e38  EFLAGS: 00250246
Dec 14 20:50:31 dc01 kernel: [2005065.352767] RAX: ffff880065857fd8 RBX: ffff880065857f58 RCX: 0000000000000000
Dec 14 20:50:31 dc01 kernel: [2005065.352769] RDX: 0000000000000000 RSI: ffff880065857ec8 RDI: 00007f2b2205ad30
Dec 14 20:50:31 dc01 kernel: [2005065.352771] RBP: 0000000000000021 R08: ffff880065856000 R09: 0000000000000000
Dec 14 20:50:31 dc01 kernel: [2005065.352774] R10: ffff88006a00b1b0 R11: 0000000000000000 R12: ffff8800658b59f0
Dec 14 20:50:31 dc01 kernel: [2005065.352776] R13: 00007f2b2205ab78 R14: ffff8800658b5550 R15: 00007f2b2205ad40
Dec 14 20:50:31 dc01 kernel: [2005065.352782] FS:  00007f2b2205b700(0000) GS:ffff88006a000000(0000) knlGS:0000000000000000
Dec 14 20:50:31 dc01 kernel: [2005065.352784] CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
Dec 14 20:50:31 dc01 kernel: [2005065.352787] CR2: 00007f9210989bc0 CR3: 00000000648ab000 CR4: 0000000000002660
Dec 14 20:50:31 dc01 kernel: [2005065.352789] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
Dec 14 20:50:31 dc01 kernel: [2005065.352792] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Dec 14 20:50:31 dc01 kernel: [2005065.352794] Process hald (pid: 1341, threadinfo ffff880065856000, task ffff8800658b5550)
Dec 14 20:50:31 dc01 kernel: [2005065.352796] Stack:
Dec 14 20:50:31 dc01 kernel: [2005065.352798]  0000000000000000 ffffffff81007555 0000000000000021 ffff8800fffffffa
Dec 14 20:50:31 dc01 kernel: [2005065.352801]  000000000000053b ffffffff81107aa0 ffff8800667c63f8 ffff880004130bc0
Dec 14 20:50:31 dc01 kernel: [2005065.352805]  ffff8800667c6410 ffff880064406c80 ffff880003d46180 ffff880064406c80
Dec 14 20:50:31 dc01 kernel: [2005065.352808] Call Trace:
Dec 14 20:50:31 dc01 kernel: [2005065.352815]  [<ffffffff81007555>] ? get_phys_to_machine+0x16/0x58
Dec 14 20:50:31 dc01 kernel: [2005065.352820]  [<ffffffff81107aa0>] ? fput+0x17a/0x1a2
Dec 14 20:50:31 dc01 kernel: [2005065.352825]  [<ffffffff81104a42>] ? filp_close+0x64/0x6c
Dec 14 20:50:31 dc01 kernel: [2005065.352828]  [<ffffffff8100d6b0>] ? __switch_to+0x1c9/0x2b1
Dec 14 20:50:31 dc01 kernel: [2005065.352832]  [<ffffffff8100e56d>] ? do_notify_resume+0x25/0x67
Dec 14 20:50:31 dc01 kernel: [2005065.352836]  [<ffffffff81047012>] ? schedule_tail+0x24/0x56
Dec 14 20:50:31 dc01 kernel: [2005065.352842]  [<ffffffff813850e0>] ? int_signal+0x12/0x17
Dec 14 20:50:31 dc01 kernel: [2005065.352845] Code: bd 38 01 00 00 e8 14 a6 04 00 85 c0 0f 85 70 02 00 00 65 48 8b 04 25 88 c6 00 00 8b 90 88 e0 ff ff c7 80 88 e0 ff ff 00 00 00 00 <48> 8b 05 7e f0 67 00 a9 00 00 00 04 74 0a 49 c7 45 08 01 00 00 
Dec 14 20:50:31 dc01 kernel: [2005065.352866] RIP  [<ffffffff8100e19f>] do_signal+0x28c/0x635
Dec 14 20:50:31 dc01 kernel: [2005065.352870]  RSP <ffff880065857e38>
Dec 14 20:50:31 dc01 kernel: [2005065.352873] ---[ end trace c3ce0a39db2dc868 ]---
Comment 1 Philipp Hahn univentionstaff 2013-02-12 09:35:31 CET

*** This bug has been marked as a duplicate of bug 30369 ***