Hello<br />
<br />
Recently I have a server that will panic almost everyday without a clear reason<br />
<br />
I checked the log no error showing from hardware, I also ran c program to fill the memory and no issue<br />
<br />
I'm not expert in kernel panic but from the vmcore dmesg it seems the panic because a python script that I recently added to the system (run as normal user)<br />
<br />
The script basically act as xmpp client the will continue running connect to external server<br />
<br />
The panic is almost everyday and sometime every 2-3 days<br />
<br />
Below is the last few lines that I have from the panic, I will upload anything else required<br />
<br />
<6>md: using maximum available idle IO bandwidth (but not more than 200000 KB/s<br />
ec) for data-check.<br />
<6>md: using 128k window, over a total of 10482176k.<br />
<6>md: md1: data-check done.<br />
<1>BUG: unable to handle kernel paging request at ffff8808db66d7c0<br />
<1>IP: [<ffffffff8142d333>] dma_memcpy_pg_to_iovec+0x103/0x1d0<br />
<4>PGD 1a86063 PUD 0 <br />
<4>Oops: 0000 [<a href="http://bugs.centos.org/view.php?id=1">0000001</a>] SMP <br />
<4>last sysfs file: /sys/devices/system/cpu/online<br />
<4>CPU 0 <br />
<4>Modules linked in: tun cpufreq_ondemand acpi_cpufreq freq_table mperf ipv6 i<br />
pt_REJECT xt_state iptable_filter ipt_MASQUERADE iptable_nat nf_nat nf_conntrac<br />
k_ipv4 nf_conntrack nf_defrag_ipv4 ip_tables ext2 microcode iTCO_wdt iTCO_vendo<br />
r_support serio_raw acpi_pad igb i2c_algo_bit ptp pps_core sb_edac edac_core i2<br />
c_i801 i2c_core sg lpc_ich mfd_core ioatdma dca shpchp ext4 jbd2 mbcache raid1 <br />
sd_mod crc_t10dif isci libsas scsi_transport_sas ahci wmi dm_mirror dm_region_h<br />
ash dm_log dm_mod [last unloaded: scsi_wait_scan]<br />
<4><br />
<4>Pid: 23834, comm: python Not tainted 2.6.32-431.5.1.el6.x86_64 <a href="http://bugs.centos.org/view.php?id=1">0000001</a> Supermicro<br />
X9DRD-iF/X9DRD-iF<br />
<4>RIP: 0010:[<ffffffff8142d333>] [<ffffffff8142d333>] dma_memcpy_pg_to_iovec+<br />
0x103/0x1d0<br />
<4>RSP: 0018:ffff880114443a18 EFLAGS: 00010287<br />
<4>RAX: ffff88086e320020 RBX: ffff880114443e98 RCX: ffffea000914e540<br />
<4>RDX: 000000000da69af4 RSI: ffff88086e320000 RDI: ffff8804760e7818<br />
<4>RBP: ffff880114443a98 R08: 00000000000000a8 R09: 0000000000000009<br />
<4>R10: 0000000000000000 R11: 00000000000000a8 R12: 0000000000000009<br />
<4>R13: 00000000000007fc R14: 0000000000000009 R15: 0000000000000009<br />
<4>FS: 00007f25a7bed700(0000) GS:ffff880028200000(0000) knlGS:0000000000000000<br />
<4>CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />
<4>CR2: ffff8808db66d7c0 CR3: 00000001d9c8d000 CR4: 00000000000407f0<br />
<4>DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br />
<4>DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400<br />
<4>Process python (pid: 23834, threadinfo ffff880114442000, task ffff88016951f5<br />
40)<br />
<4>Stack:<br />
<4> ffff880114443ac8 ffffffff81528ac5 0000000000005976 ffff880114443e98<br />
<4><d> ffff88086e320000 ffff88086e320010 ffffea000914e540 ffff8804760e7818<br />
<4><d> 000000000da69af4 0000000000000246 ffff880114443ac8 0000000000000000<br />
<4>Call Trace:<br />
<4> [<ffffffff81528ac5>] ? schedule_timeout+0x215/0x2e0<br />
<4> [<ffffffff81473bc7>] dma_skb_copy_datagram_iovec+0x117/0x2d0<br />
<4> [<ffffffff814a47fb>] tcp_recvmsg+0x57b/0xe80<br />
<4> [<ffffffff81527c20>] ? thread_return+0x4e/0x76e<br />
<4> [<ffffffff81068ff5>] ? enqueue_entity+0x125/0x450<br />
<4> [<ffffffff814c5bfa>] inet_recvmsg+0x5a/0x90<br />
<4> [<ffffffff81449cb3>] sock_recvmsg+0x133/0x160<br />
<4> [<ffffffff8109b290>] ? autoremove_wake_function+0x0/0x40<br />
<4> [<ffffffff810ae940>] ? wake_futex+0x40/0x60<br />
<4> [<ffffffff810af1be>] ? futex_wake+0x10e/0x120<br />
<4> [<ffffffff810b1120>] ? do_futex+0x100/0xb60<br />
<4> [<ffffffff8104a98c>] ? __do_page_fault+0x1ec/0x480<br />
<4> [<ffffffff81449e2e>] sys_recvfrom+0xee/0x180<br />
<4> [<ffffffff8100988e>] ? __switch_to+0x26e/0x320<br />
<4> [<ffffffff81527c20>] ? thread_return+0x4e/0x76e<br />
<4> [<ffffffff810b1bfb>] ? sys_futex+0x7b/0x170<br />
<4> [<ffffffff8152d76e>] ? do_page_fault+0x3e/0xa0<br />
<4> [<ffffffff8100b072>] system_call_fastpath+0x16/0x1b<br />
<4>Code: 00 10 00 00 45 0f 4f f7 44 29 e8 48 63 55 c0 41 39 c6 48 8b 7d b8 45 8<br />
9 d8 44 0f 4f f0 48 8b 41 08 48 8b 4d b0 4d 63 e6 4d 89 e1 <48> 8b 34 d0 44 89 <br />
ea 44 89 5d 88 e8 9d e8 ff ff 85 c0 44 8b 5d <br />
<1>RIP [<ffffffff8142d333>] dma_memcpy_pg_to_iovec+0x103/0x1d0<br />
<4> RSP <ffff880114443a18><br />
<4>CR2: ffff8808db66d7c0
↧