Article ID: 120478, created on Mar 8, 2014, last review on May 11, 2014

  • Applies to:
  • Virtuozzo 6.0
  • Virtuozzo containers for Linux

Symptoms

Node crashes with the following messages in dmesg (usually crash is triggered by vzctl enter command):

[ 3420.114526] BUG: unable to handle kernel NULL pointer dereference at 0000000000000008
[ 3420.130297] IP: [<ffffffff81518dfe>] _spin_lock+0xe/0x30
[ 3420.140968] PGD fda184067 PUD ddf478067 PMD 0 
[ 3420.149928] Oops: 0002 [#1] SMP 
[ 3420.156441] last sysfs file: /sys/devices/system/cpu/cpu23/cache/index2/shared_cpu_map
[ 3420.172334] CPU 15 
[ 3420.176162] Modules linked in: cls_fw sch_cbq ip_vzredir(P)(U) vzredir(P)(U) vzcompat(P)(U) vzrst vznetdev ip6_vzprivnet(P)(U) ip6_vzredir(P)(U) ip6_vznetstat(P)(U) ip_vzprivnet(P)(U) vziolimit(P)(U) vzsnap(P)(U) vzfs(P)(U) vzdquota vzcpt nfs lockd fscache auth_rpcgss nfs_acl sunrpc vzlinkdev(P)(U) vzethdev vzevent vzlist(P)(U) vzstat(P)(U) vzmon ip_vznetstat(P)(U) vznetstat(P)(U) vzdev nf_nat_ftp xt_DSCP dell_rbu ipv6 xt_mark xt_connlimit ipt_MASQUERADE xt_length xt_hl xt_tcpmss xt_TCPMSS iptable_nat iptable_mangle xt_dscp xt_recent xt_owner nf_conntrack_ftp xt_conntrack ipt_REDIRECT nf_nat ipt_REJECT xt_multiport ipt_LOG xt_limit nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack iptable_filter ip_tables xt_MARK arc4 ecb ppp_mppe ip_gre ppp_async crc_ccitt ppp_deflate zlib_deflate ppp_generic slhc fuse tun power_meter ses enclosure sg bnx2 dcdbas microcode serio_raw iTCO_wdt iTCO_vendor_support i7core_edac edac_core ext4 mbcache jbd2 sr_mod cdrom sd_mod crc_t10dif usb_storage pata_acpi ata_generic ata_piix wmi megaraid_sas dm_mirror dm_region_hash dm_log dm_mod [last unloaded: speedstep_lib]
[ 3420.373213] 
[ 3420.376236] Pid: 59435, comm: vzctl veid: 16308 Tainted: P           ---------------    2.6.32-042stab078.26 #1 042stab078_26 Dell Inc. PowerEdge R410/01V648
[ 3420.404490] RIP: 0010:[<ffffffff81518dfe>]  [<ffffffff81518dfe>] _spin_lock+0xe/0x30
[ 3420.420055] RSP: 0018:ffff880e772a5b38  EFLAGS: 00010246
[ 3420.430699] RAX: 0000000000010000 RBX: 0000000000000000 RCX: 0000000000000000
[ 3420.444985] RDX: 000000000000bd13 RSI: 0000000000000282 RDI: 0000000000000008
[ 3420.459270] RBP: ffff880e772a5b38 R08: 0000000000000000 R09: 0000000000000000
[ 3420.473555] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000008
[ 3420.487842] R13: 0000000000000000 R14: ffff881017c092f8 R15: 0000000000000000
[ 3420.502130] FS:  00007f739c0bbb20(0000) GS:ffff8800499c0000(0000) knlGS:0000000000000000
[ 3420.518383] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 3420.529899] CR2: 0000000000000008 CR3: 0000000ee3db9000 CR4: 00000000000007e0
[ 3420.544180] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 3420.558466] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[ 3420.572752] Process vzctl (pid: 59435, veid: 16308, threadinfo ffff880e772a4000, task ffff880c3b1d6800)
[ 3420.591599] Stack:
[ 3420.595660]  ffff880e772a5b68 ffffffff811c0ef7 ffff880e772a5b68 ffff88080d394aa8
[ 3420.610163] <d> ffff8802b9ef9938 0000000000000000 ffff880e772a5b98 ffffffff81227091
[ 3420.625620] <d> ffff88081e5ae800 ffff880819322800 ffff88081e5ae800 ffff88079634c680
[ 3420.641490] Call Trace:
[ 3420.646426]  [<ffffffff811c0ef7>] d_delete+0x37/0xf0
[ 3420.656378]  [<ffffffff81227091>] devpts_pty_kill+0x81/0xc0
[ 3420.667548]  [<ffffffff8133b3c4>] pty_close+0x154/0x160
[ 3420.678026]  [<ffffffff8133320b>] tty_release_dev+0x16b/0x5e0
[ 3420.689543]  [<ffffffff811c1d9f>] ? destroy_inode+0x4f/0x60
[ 3420.700709]  [<ffffffff811c1722>] ? iput+0x62/0x70
[ 3420.710328]  [<ffffffff81227306>] ? devpts_pty_new+0x236/0x2c0
[ 3420.722010]  [<ffffffff8133b5d8>] ptmx_open+0xf8/0x110
[ 3420.732315]  [<ffffffff811a9925>] chrdev_open+0x125/0x230
[ 3420.743133]  [<ffffffff811a9800>] ? chrdev_open+0x0/0x230
[ 3420.753952]  [<ffffffff811a1c6a>] __dentry_open+0x10a/0x360
[ 3420.765116]  [<ffffffff81249978>] ? devcgroup_inode_permission+0x48/0x50
[ 3420.778532]  [<ffffffff811a23c4>] nameidata_to_filp+0x54/0x70
[ 3420.790047]  [<ffffffff811b7b60>] do_filp_open+0x700/0xcf0
[ 3420.801044]  [<ffffffff81519315>] ? page_fault+0x25/0x30
[ 3420.811690]  [<ffffffff8128fb2b>] ? strncpy_from_user+0x5b/0x90
[ 3420.823543]  [<ffffffff8128fb1a>] ? strncpy_from_user+0x4a/0x90
[ 3420.835410]  [<ffffffff811c4a82>] ? alloc_fd+0x92/0x160
[ 3420.845882]  [<ffffffff811a1a19>] do_sys_open+0x69/0x140
[ 3420.856530]  [<ffffffff811a1b30>] sys_open+0x20/0x30
[ 3420.866490]  [<ffffffff8100b102>] system_call_fastpath+0x16/0x1b
[ 3420.878516] Code: e5 0f 1f 44 00 00 fa 66 0f 1f 44 00 00 f0 81 2f 00 00 00 01 74 05 e8 b2 68 d7 ff c9 c3 55 48 89 e5 0f 1f 44 00 00 b8 00 00 01 00 <f0> 0f c1 07 0f b7 d0 c1 e8 10 39 c2 74 0e f3 90 0f b7 17 eb f5 
[ 3420.917279] RIP  [<ffffffff81518dfe>] _spin_lock+0xe/0x30
[ 3420.928115]  RSP <ffff880e772a5b38>
[ 3420.935121] CR2: 0000000000000008

Cause

The issue is recognized as a kernel bug with ID PSBM-25317.

Resolution

The fix will be implemented in one of product updates.

Search Words

kernel panic

vmcore

vzctl enter

crash

d02f9caf3e11b191a38179103495106f 2897d76d56d2010f4e3a28f864d69223 e8e50b42231236b82df27684e7ec0beb c62e8726973f80975db0531f1ed5c6a2 0dd5b9380c7d4884d77587f3eb0fa8ef

Email subscription for changes to this article
Save as PDF