<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On Sat, May 20, 2017 at 8:30 PM, Sarah Newman <span dir="ltr"><<a href="mailto:srn@prgmr.com" target="_blank">srn@prgmr.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">I experienced a bug that is likely the same as <a href="https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1350373" rel="noreferrer" target="_blank">https://bugs.launchpad.net/<wbr>ubuntu/+source/linux/+bug/<wbr>1350373</a> . Commit<br>
b7dd0e350e0bd4c0fddcc9b8958342<wbr>700b00b168 , which is supposed to fix it, doesn't appear in this kernel and doesn't apply cleanly either.<br>
Is there any point in trying to backport the patch?<br>
<br>
The backtrace is as follows:<br>
<br>
[   32.304666] ------------[ cut here ]------------<br>
[   32.304679] kernel BUG at arch/x86/kernel/paravirt.c:<wbr>252!<br>
[   32.304683] invalid opcode: 0000 [#1] SMP<br>
[   32.304687] Modules linked in: ip6t_rpfilter ipt_REJECT nf_reject_ipv4 ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat<br>
ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat<br>
nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw ebtable_filter ebtables ip6table_filter<br>
ip6_tables iptable_filter intel_powerclamp coretemp pcspkr ip_tables ext4 mbcache jbd2 xen_netfront xen_blkfront crc32c_intel<br>
[   32.304734] CPU: 0 PID: 3901 Comm: dracut Not tainted 3.10.0-514.16.1.el7.x86_64 #1<br>
[   32.304739] task: ffff880002598000 ti: ffff88001b728000 task.ti: ffff88001b728000<br>
[   32.304743] RIP: e030:[<ffffffff8167eb81>]  [<ffffffff8167eb81>] enter_lazy.part.0+0x4/0x6<br>
[   32.304755] RSP: e02b:ffff88001f803aa8  EFLAGS: 00010002<br>
[   32.304758] RAX: 0000000000000001 RBX: ffff88001eacd640 RCX: 00003ffffffff000<br>
[   32.304761] RDX: ffff880000000640 RSI: ffffc900000c8000 RDI: 0000000000000001<br>
[   32.304765] RBP: ffff88001f803aa8 R08: ffff88001f803b78 R09: ffffffff813d50f9<br>
[   32.304771] R10: ffff88001e801e00 R11: ffffea0000093dc0 R12: ffffc900000c9000<br>
[   32.304777] R13: ffffc900000c8000 R14: 0000000000000000 R15: ffff88001d150340<br>
[   32.304787] FS:  00007f64425b0740(0000) GS:ffff88001f800000(0000) knlGS:0000000000000000<br>
[   32.304796] CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b<br>
[   32.304801] CR2: 00000000006de2c8 CR3: 000000001b405000 CR4: 0000000000002660<br>
[   32.304807] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br>
[   32.304813] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400<br>
[   32.304818] Stack:<br>
[   32.304823]  ffff88001f803ab8 ffffffff81061857 ffff88001f803b60 ffffffff811b1fe2<br>
[   32.304833]  ffffc900000c8fff ffffc900000c9000 ffffffff819bac90 ffffc900000c8fff<br>
[   32.304843]  ffffc900000c9000 ffff88001eacb000 ffffffff810206b0 0000000000000000<br>
[   32.304854] Call Trace:<br>
[   32.304858]  <IRQ><br>
[   32.304861]  [<ffffffff81061857>] paravirt_enter_lazy_mmu+0x27/<wbr>0x30<br>
[   32.304879]  [<ffffffff811b1fe2>] apply_to_page_range+0x282/<wbr>0x460<br>
[   32.304888]  [<ffffffff810206b0>] ? map_pte_fn+0x60/0x60<br>
[   32.304894]  [<ffffffff810207fb>] arch_gnttab_map_status+0x3b/<wbr>0x70<br>
[   32.304904]  [<ffffffff813d5176>] gnttab_map_frames_v2+0xd6/<wbr>0x150<br>
[   32.304910]  [<ffffffff813d5291>] gnttab_map+0xa1/0x140<br>
[   32.304917]  [<ffffffff813d5430>] get_free_entries+0x100/0x2e0<br>
[   32.304923]  [<ffffffff813d56d5>] gnttab_alloc_grant_references+<wbr>0x15/0x30<br>
[   32.304933]  [<ffffffffa000bd4f>] do_blkif_request+0x6bf/0x8a0 [xen_blkfront]<br>
[   32.304945]  [<ffffffff812eb0e2>] ? __freed_request+0x92/0xa0<br>
[   32.304951]  [<ffffffff812eb6e3>] __blk_run_queue+0x33/0x40<br>
[   32.304957]  [<ffffffff812eb719>] blk_start_queue+0x29/0x40<br>
[   32.304964]  [<ffffffffa000bf51>] kick_pending_request_queues+<wbr>0x21/0x30 [xen_blkfront]<br>
[   32.304975]  [<ffffffffa000c6ce>] blkif_interrupt+0x76e/0x820 [xen_blkfront]<br>
[   32.304986]  [<ffffffff811dcc8b>] ? kmem_cache_free+0x1bb/0x1f0<br>
[   32.304995]  [<ffffffff8113079e>] handle_irq_event_percpu+0x3e/<wbr>0x1e0<br>
[   32.305003]  [<ffffffff8113097d>] handle_irq_event+0x3d/0x60<br>
[   32.305004]  [<ffffffff81133647>] handle_edge_irq+0x77/0x130<br>
[   32.305004]  [<ffffffff813d6217>] __xen_evtchn_do_upcall+0x227/<wbr>0x350<br>
[   32.305004]  [<ffffffff813d83c3>] xen_evtchn_do_upcall+0x33/0x50<br>
[   32.305004]  [<ffffffff81698c7e>] xen_do_hypervisor_callback+<wbr>0x1e/0x30<br>
[   32.305004]  <EOI><br>
[   32.305004]  [<ffffffff811af916>] ? copy_pte_range+0x2b6/0x5a0<br>
[   32.305004]  [<ffffffff811af8e6>] ? copy_pte_range+0x286/0x5a0<br>
[   32.305004]  [<ffffffff811b24d2>] ? copy_page_range+0x312/0x490<br>
[   32.305004]  [<ffffffff81083012>] ? dup_mm+0x362/0x680<br>
[   32.305004]  [<ffffffff810847ae>] ? copy_process+0x144e/0x1960<br>
[   32.305004]  [<ffffffff81084e71>] ? do_fork+0x91/0x2c0<br>
[   32.305004]  [<ffffffff81085126>] ? SyS_clone+0x16/0x20<br>
[   32.305004]  [<ffffffff816974d9>] ? stub_clone+0x69/0x90<br>
[   32.305004]  [<ffffffff81697189>] ? system_call_fastpath+0x16/0x1b<br>
[   32.305004] Code: 20 e9 2f ff ff ff 44 89 fa 44 89 ee 48 c7 c7 10 45 8c 81 31 c0 e8 9d 14 00 00 58 5a 5b 41 5c 41 5d 41 5e 41 5f 5d c3 55 48 89 e5<br>
<0f> 0b 66 66 66 66 90 55 48 89 e5 0f 0b 55 48 89 e5 0f 0b 55 48<br>
[   32.305004] RIP  [<ffffffff8167eb81>] enter_lazy.part.0+0x4/0x6<br>
[   32.305004]  RSP <ffff88001f803aa8><br>
[   32.305004] ---[ end trace 49f67f0d85e1ac69 ]---<br>
[   32.305004] Kernel panic - not syncing: Fatal exception in interrupt<br>
<br></blockquote><div><br></div><div>I had the same kernel panic while booting a PV domU on 3.10.0-693.2.2.el7.centos.plus.x86_64. I had to start the domU again to boot correctly. Can this patch be added to the CentOS 7 kernel-plus?</div><div><br></div><div>[ 13.372417] ------------[ cut here ]------------<br>[ 13.372434] kernel BUG at arch/x86/kernel/paravirt.c:252!<br>[ 13.372441] invalid opcode: 0000 [#1] SMP <br>[ 13.372450] Modules linked in: xt_owner nf_nat_ftp xt_REDIRECT nf_nat_redirect xt_conntrack iptable_mangle nf_conntrack_ftp xt_LOG xt_limit xt_multiport iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack ipt_REJECT nf_reject_ipv4 iptable_filter vfat fat isofs xfs libcrc32c loop sb_edac edac_core coretemp intel_rapl iosf_mbi crc32_pclmul ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd pcspkr ip_tables ext4 mbcache jbd2 xen_blkfront xen_netfront crct10dif_pclmul crct10dif_common crc32c_intel<br>[ 13.372545] CPU: 0 PID: 1138 Comm: mysqld Not tainted 3.10.0-693.2.2.el7.centos.plus.x86_64 #1<br>[ 13.372555] task: ffff8800fb1a8fd0 ti: ffff8801e9e20000 task.ti: ffff8801e9e20000<br>[ 13.372561] RIP: e030:[<ffffffff816ad7fe>] [<ffffffff816ad7fe>] enter_lazy.part.0+0x4/0x6<br>[ 13.372579] RSP: e02b:ffff8801fea03a80 EFLAGS: 00010002<br>[ 13.372584] RAX: 0000000000000001 RBX: ffff88017d05b280 RCX: ffffffff810215a0<br>[ 13.372593] RDX: ffff880000000280 RSI: 00003ffffffff000 RDI: 0000000000000001<br>[ 13.372599] RBP: ffff8801fea03a80 R08: ffff8801fea03b50 R09: ffffffff813f6559<br>[ 13.372605] R10: ffff88017fc01d00 R11: ffffea00000c0380 R12: ffffc90000c52000<br>[ 13.372616] R13: ffffc90000c50000 R14: 0000000000000000 R15: ffff8801e3770e00<br>[ 13.372632] FS: 00007febcc67a900(0000) GS:ffff8801fea00000(0000) knlGS:ffff8801fea00000<br>[ 13.372644] CS: e033 DS: 0000 ES: 0000 CR0: 0000000080050033<br>[ 13.372654] CR2: 000056038881bd60 CR3: 00000000f996d000 CR4: 0000000000042660<br>[ 13.372663] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br>[ 13.372672] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400<br>[ 13.372680] Stack:<br>[ 13.372685] ffff8801fea03a90 ffffffff81063b05 ffff8801fea03b38 ffffffff811b2a80<br>[ 13.372701] ffffc90000c51fff ffffc90000c52000 ffffffff81a0ac90 ffffc90000c51fff<br>[ 13.372718] ffffc90000c52000 ffff88017fc50000 ffffffff810215a0 00000000fead6d00<br>[ 13.372733] Call Trace:<br>[ 13.372740] <IRQ> <br>[ 13.372744] [<ffffffff81063b05>] paravirt_enter_lazy_mmu+0x25/0x30<br>[ 13.372771] [<ffffffff811b2a80>] apply_to_page_range+0x260/0x430<br>[ 13.372784] [<ffffffff810215a0>] ? map_pte_fn+0x60/0x60<br>[ 13.372794] [<ffffffff810216eb>] arch_gnttab_map_status+0x3b/0x70<br>[ 13.372809] [<ffffffff813f65d6>] gnttab_map_frames_v2+0xd6/0x150<br>[ 13.372820] [<ffffffff813f66f1>] gnttab_map+0xa1/0x140<br>[ 13.372831] [<ffffffff813f6890>] get_free_entries+0x100/0x2e0</div><div><br></div><div>Karl<br></div></div><br></div></div>