You are not logged in.

#1 2025-12-06 21:22:40

reactormonk
Member
Registered: 2012-10-23
Posts: 30

Kernel Panic

I've just gotten a Kernel Panic, but I'm not exactly sure what triggered it, I was mostly using firefox on KDE. Anyone got any advice as to what could be the issue here?

Panic Report
Arch: x86_64
Version: 6.17.9-arch1-1

[395816.740696] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[395816.740698] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[395816.740703]  ? early_xen_iret_patch+0xc/0xc
[395816.740711]  exc_page_fault+0x29/0x1a0
[395816.740718]  asm_exc_page_fault+0x26/0x30
[395816.740722] RIP: 0010:irqentry_enter+0xd/0x50
[395816.740726] Code: 40 00 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 f6 87 88 00 00 00 03 75 23 <65> 48 8b 05 63 38 d9 01 f6 40 2c 02 75 21 66 90 31 c0 e9 5c 25 01
[395816.740729] RSP: 0000:fffffe57aaa4eb18 EFLAGS: 00010046
[395816.740733] RAX: 00007fbb9350f018 RBX: fffffe57aaa4eb48 RCX: ffffffff90401968
[395816.740735] RDX: 0000000000000000 RSI: 0000000000000000 RDI: fffffe57aaa4eb48
[395816.740737] RBP: 00007fbb9350f018 R08: 0000000000000000 R09: 0000000000000000
[395816.740740] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[395816.740743] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[395816.740752]  ? early_xen_iret_patch+0xc/0xc
[395816.740761]  exc_page_fault+0x29/0x1a0
[395816.740767]  asm_exc_page_fault+0x26/0x30
[395816.740771] RIP: 0010:irqentry_enter+0xd/0x50
[395816.740776] Code: 40 00 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 f6 87 88 00 00 00 03 75 23 <65> 48 8b 05 63 38 d9 01 f6 40 2c 02 75 21 66 90 31 c0 e9 5c 25 01
[395816.740779] RSP: 0000:fffffe57aaa4ebf8 EFLAGS: 00010046
[395816.740782] RAX: 00007fbb9350f018 RBX: fffffe57aaa4ec28 RCX: ffffffff90401968
[395816.740785] RDX: 0000000000000000 RSI: 0000000000000000 RDI: fffffe57aaa4ec28
[395816.740787] RBP: 00007fbb9350f018 R08: 0000000000000000 R09: 0000000000000000
[395816.740790] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[395816.740793] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[395816.740799]  ? early_xen_iret_patch+0xc/0xc
[395816.740808]  exc_page_fault+0x29/0x1a0
[395816.740815]  asm_exc_page_fault+0x26/0x30
[395816.740820] RIP: 0010:irqentry_enter+0xd/0x50
[395816.740825] Code: 40 00 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 f6 87 88 00 00 00 03 75 23 <65> 48 8b 05 63 38 d9 01 f6 40 2c 02 75 21 66 90 31 c0 e9 5c 25 01
[395816.740828] RSP: 0000:fffffe57aaa4ecd8 EFLAGS: 00010046
[395816.740831] RAX: 00007fbb9350f018 RBX: fffffe57aaa4ed08 RCX: ffffffff90401968
[395816.740834] RDX: 0000000000000000 RSI: 0000000000000000 RDI: fffffe57aaa4ed08
[395816.740836] RBP: 00007fbb9350f018 R08: 0000000000000000 R09: 0000000000000000
[395816.740839] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[395816.740841] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[395816.740849]  ? early_xen_iret_patch+0xc/0xc
[395816.740857]  exc_page_fault+0x29/0x1a0
[395816.740862]  asm_exc_page_fault+0x26/0x30
[395816.740865] RIP: 0010:irqentry_enter+0xd/0x50
[395816.740868] Code: 40 00 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 f6 87 88 00 00 00 03 75 23 <65> 48 8b 05 63 38 d9 01 f6 40 2c 02 75 21 66 90 31 c0 e9 5c 25 01
[395816.740871] RSP: 0000:fffffe57aaa4edb8 EFLAGS: 00010046
[395816.740873] RAX: 00007fbb9350f008 RBX: fffffe57aaa4ede8 RCX: ffffffff90401968
[395816.740875] RDX: 0000000000000000 RSI: 0000000000000000 RDI: fffffe57aaa4ede8
[395816.740877] RBP: 00007fbb9350f008 R08: 0000000000000000 R09: 0000000000000000
[395816.740878] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[395816.740880] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[395816.740885]  ? early_xen_iret_patch+0xc/0xc
[395816.740892]  exc_page_fault+0x29/0x1a0
[395816.740896]  asm_exc_page_fault+0x26/0x30
[395816.740899] RIP: 0010:exc_general_protection+0xf/0x430
[395816.740904] Code: 87 f5 fe eb a1 66 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 41 54 55 53 48 89 fb 48 83 ec 78 <65> 48 8b 2d 31 7f d9 01 48 89 6c 24 70 48 89 f5 e8 bc 46 00 00 41
[395816.740907] RSP: 0000:fffffe57aaa4ee90 EFLAGS: 00010086
[395816.740909] RAX: fffffe57aaa4ef28 RBX: fffffe57aaa4ef28 RCX: ffffffff90401968
[395816.740911] RDX: 0000000000000000 RSI: 0000000000000000 RDI: fffffe57aaa4ef28
[395816.740913] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[395816.740915] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[395816.740916] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[395816.740922]  ? early_xen_iret_patch+0xc/0xc
[395816.740934]  asm_exc_general_protection+0x26/0x30
[395816.740938] RIP: 0010:asm_exc_page_fault+0x0/0x30
[395816.740941] Code: 74 24 28 ff 74 24 28 ff 74 24 28 ff 74 24 28 ff 74 24 28 e8 f2 09 00 00 48 89 c4 48 89 e7 e8 87 62 37 01 e9 22 0b 00 00 66 90 <f3> 0f 1e fa 0f 01 ca fc e8 d3 09 00 00 48 89 c4 48 89 e7 48 8b 74
[395816.740943] RSP: 0000:fffffe57aaa4efd0 EFLAGS: 00010046
[395816.740945] RAX: 00000b395e405120 RBX: fffe0553a72d78f8 RCX: fffe3c4b5038faf8
[395816.740947] RDX: fffe0553a72d7880 RSI: 0000000000000000 RDI: 000010aebd597938
[395816.740949] RBP: 00007ffe2d63cb70 R08: 000016212517a128 R09: 000021e7dfadbb78
[395816.740951] R10: 0000332efffd39a0 R11: fff9800000000000 R12: 0000000000000001
[395816.740953] R13: fffe0553a72d78f8 R14: 0000000000000001 R15: fffe0b2645a532a8
[395816.740961] RIP: 0033:0x37f9cc6ab209
[395816.740988] RSP: 002b:00007ffe2d63cb00 EFLAGS: 00010246
[395816.740993]  </ENTRY_TRAMPOLINE>
[395816.740995] Modules linked in: uinput snd_seq_dummy rfcomm snd_hrtimer snd_seq cfg80211 wireguard curve25519_x86_64 libcurve25519_generic ip6_udp_tunnel udp_tunnel udp_diag tcp_diag inet_diag nf_conntrack_netlink nfnetlink_acct nft_masq nft_ct nft_reject_ipv4 nf_reject_ipv4 nft_reject act_csum cls_u32 sch_htb nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables bridge stp llc cmac algif_hash algif_skcipher af_alg bnep amdgpu amd_atl intel_rapl_msr snd_hda_codec_alc662 intel_rapl_common vfat snd_hda_codec_realtek_lib fat snd_hda_codec_generic snd_hda_codec_atihdmi snd_hda_codec_hdmi amdxcp gpu_sched uvcvideo snd_hda_intel drm_panel_backlight_quirks snd_usb_audio videobuf2_vmalloc snd_hda_codec drm_buddy essiv uvc authenc drm_exec snd_usbmidi_lib videobuf2_memops snd_hda_core drm_suballoc_helper snd_ump videobuf2_v4l2 kvm_amd drm_ttm_helper snd_intel_dspcfg btusb ee1004 ttm snd_rawmidi btrtl snd_intel_sdw_acpi wmi_bmof videobuf2_common snd_hwdep i2c_algo_bit snd_seq_device btintel r8169 kvm btbcm
[395816.741091]  snd_pcm drm_display_helper videodev realtek btmtk irqbypass mdio_devres cec snd_timer sp5100_tco rapl pcspkr acpi_cpufreq libphy video snd bluetooth i2c_piix4 mdio_bus soundcore i2c_smbus k10temp rfkill mc joydev gpio_amdpt mousedev wmi gpio_generic mac_hid usbip_host usbip_core pkcs8_key_parser i2c_dev sg crypto_user ntsync loop nfnetlink zfs(POE) spl(OE) ip_tables x_tables dm_crypt encrypted_keys trusted asn1_encoder tee dm_mod hid_lenovo hid_logitech_hidpp nvme polyval_clmulni ghash_clmulni_intel nvme_core aesni_intel nvme_keyring ccp nvme_auth
[395816.741147] ---[ end trace 0000000000000000 ]---
[395816.741150] RIP: 0010:error_entry+0x1a/0x140
[395816.741153] Code: f8 e9 eb fc ff ff 66 2e 0f 1f 84 00 00 00 00 00 56 48 8b 74 24 08 48 89 7c 24 08 52 51 50 41 50 41 51 41 52 41 53 53 55 41 54 <41> 55 41 56 41 57 56 31 f6 31 d2 31 c9 45 31 c0 45 31 c9 45 31 d2
[395816.741154] RSP: 0000:fffffe57aaa4e000 EFLAGS: 00010046
[395816.741156] RAX: 00007fbb9350f018 RBX: fffffe57aaa4e0c8 RCX: ffffffff90401968
[395816.741158] RDX: 0000000000000000 RSI: ffffffff9040128d RDI: fffffe57aaa4e0c8
[395816.741159] RBP: 00007fbb9350f018 R08: 0000000000000000 R09: 0000000000000000
[395816.741161] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[395816.741162] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[395816.741163] FS:  00007fc0166b67c0(0000) GS:ffff8dec1bb09000(0000) knlGS:ffff8dec1bb09000
[395816.741166] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[395816.741167] CR2: fffffe57aaa4dff8 CR3: 000000067afac000 CR4: 00000000003506f0
[395816.741169] Kernel panic - not syncing: Fatal exception in interrupt
[395816.741413] Kernel Offset: 0xf400000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)

Last edited by reactormonk (2025-12-06 21:23:04)

Offline

#2 2025-12-06 23:34:42

seth
Member
From: Don't DM me only for attention
Registered: 2012-09-03
Posts: 73,194

Re: Kernel Panic

[395816.740849]  ? early_xen_iret_patch+0xc/0xc
zfs(POE) spl(OE)

Virtual machine? And I guess you cannot just try this w/o zfs?
The general area will be like https://github.com/sickcodes/security/b … 022-128.md but it's probably not that bug.

Checking whether the pattern has previously emerged, google only references this very thread w/ its analysis

The terms "early_xen_iret_patch" and "irqentry_enter" are function names within the Linux kernel, and their simultaneous appearance, typically in a stack trace, indicates a kernel crash (panic) related to the Xen hypervisor environment or interrupt handling.
The specific sequence early_xen_iret_patch+0xc/0xc followed by RIP: 0010:irqentry_enter+0xd/0x50 in kernel logs points to a memory access violation (page fault) occurring during the process of entering an interrupt service routine while running under the Xen hypervisor.
Common causes for this crash include:
Hardware Issues: Faulty RAM or other hardware components can lead to memory corruption that manifests in this way.
Kernel/Driver Bugs: Incompatibilities or bugs in the Linux kernel, specific drivers, or the Xen hypervisor implementation itself can trigger this error.
System Configuration: Incorrect configuration, particularly around virtualization settings or kernel parameters, might also be a factor.
Users encountering this error in environments like Arch Linux typically resolve it by troubleshooting hardware, updating their kernel/drivers, or seeking assistance on specific technical forums such as the Arch Linux Forums where similar issues are discussed.

It's not wrong and still hilarious.

Since it's not shown up so far I indeed suspect a problem between xen and zfs, but that's circumstancial.
Now let's see when the AI has picked that up lol

Offline

#3 2025-12-08 13:33:58

reactormonk
Member
Registered: 2012-10-23
Posts: 30

Re: Kernel Panic

Virtual machine?

No, it shouldn't be a VM, unless I've messed up my boot... which is straight to Linux, no xen (?) involved. Maybe I messed up some config somewhere? I'd like to keep AMD-V active for the occasional Windows VM.

And I guess you cannot just try this w/o zfs?

That might be a bit too difficult ^^

Offline

#4 2025-12-08 16:56:00

loqs
Member
Registered: 2014-03-06
Posts: 18,788

Re: Kernel Panic

[395816.740849]  ? early_xen_iret_patch+0xc/0xc

There is question mark in backtrace at that point perhaps the stack is corrupted around https://github.com/torvalds/linux/blob/ … _64.S#L635?
Edit:
If the panic is reproducible perhaps build a kernel without CONFIG_XEN_PV to see if the panic still occurs and if so what the new trace is.

Last edited by loqs (2025-12-08 18:22:15)

Offline

#5 2025-12-08 22:08:21

seth
Member
From: Don't DM me only for attention
Registered: 2012-09-03
Posts: 73,194

Re: Kernel Panic

Probably, open question are the dimensions of "around" (apparently we should not be anywhere near the XEN code)

@reactormonk do you have more messages leading up to this?
How frequent is it? Was it a one-off? Or a first?
Can you provoke it by stressing the FS (scrubbing it etc)?

Offline

#6 2025-12-11 07:43:28

ReDress
Member
From: Nairobi
Registered: 2024-11-30
Posts: 236

Re: Kernel Panic

reactormonk wrote:

Virtual machine?

No, it shouldn't be a VM, unless I've messed up my boot... which is straight to Linux, no xen (?) involved. Maybe I messed up some config somewhere? I'd like to keep AMD-V active for the occasional Windows VM.

You can check without with cpuid.

For example on KVM VM cpuid gives something like

      AVX/YMM save state byte offset           = 0x00000240 (576)
      supported in IA32_XSS or XCR0            = XCR0 (user state)
      64-byte alignment in compacted XSAVE     = false
      XFD faulting supported                   = false
   hypervisor_id (0x40000000) = "KVMKVMKVM\0\0\0"
   hypervisor features (0x40000001/eax):
      kvmclock available at MSR 0x11           = true
      delays unnecessary for PIO ops           = true

Offline

Board footer

Powered by FluxBB