Bug 65921

Summary: BUG: unable to handle kernel paging request at 00000000002000d4
Product: Memory Management Reporter: Mikhail (mikhail.v.gavrilov)
Component: Page AllocatorAssignee: Andrew Morton (akpm)
Status: RESOLVED DUPLICATE    
Severity: normal CC: alan
Priority: P1    
Hardware: All   
OS: Linux   
Kernel Version: 3.12 Subsystem:
Regression: No Bisected commit-id:
Attachments: dmesg output

Description Mikhail 2013-11-27 04:29:05 UTC
Created attachment 116361 [details]
dmesg output

[27655.534370] BUG: unable to handle kernel paging request at 00000000002000d4
[27655.534412] IP: [<ffffffff81219f7d>] mntput+0xd/0x40
[27655.534430] PGD 5e6e64067 PUD 0 
[27655.534454] Oops: 0000 [#1] SMP 
[27655.534464] Modules linked in: rfcomm nls_utf8 vfat fat isofs fuse nf_conntrack_netbios_ns nf_conntrack_broadcast ipt_MASQUERADE ip6t_REJECT xt_conntrack cfg80211 ebtable_nat ebtable_broute bridge stp llc ebtable_filter ebtables ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw ip6table_filter ip6_tables iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw bnep iTCO_wdt iTCO_vendor_support ppdev joydev x86_pkg_temp_thermal coretemp cdc_ncm kvm_intel option usbnet kvm usb_wwan crct10dif_pclmul crc32_pclmul btusb crc32c_intel bluetooth ghash_clmulni_intel rfkill microcode snd_hda_codec_realtek snd_hda_codec_hdmi snd_hda_intel snd_hda_codec snd_hwdep serio_raw snd_seq snd_seq_device
[27655.534682]  snd_pcm r8169 mii snd_page_alloc snd_timer lpc_ich snd mei_me i2c_i801 mfd_core soundcore mei shpchp parport_pc parport binfmt_misc nfsd auth_rpcgss nfs_acl lockd sunrpc hid_logitech_dj usb_storage i915 i2c_algo_bit drm_kms_helper drm i2c_core video
[27655.534757] CPU: 1 PID: 3442 Comm: chrome Not tainted 3.12.0-2.fc21.x86_64+debug #1
[27655.534775] Hardware name: Gigabyte Technology Co., Ltd. Z87M-D3H/Z87M-D3H, BIOS F8 08/03/2013
[27655.534796] task: ffff8806fefb4ac0 ti: ffff8806fefd8000 task.ti: ffff8806fefd8000
[27655.534814] RIP: 0010:[<ffffffff81219f7d>]  [<ffffffff81219f7d>] mntput+0xd/0x40
[27655.534833] RSP: 0018:ffff8806fefd9ed0  EFLAGS: 00010206
[27655.534846] RAX: 0000000000200000 RBX: ffff88070bdab1e8 RCX: ffff8806fefd8000
[27655.534863] RDX: 0000000000000080 RSI: ffffffffffffff92 RDI: 0000000000200000
[27655.534879] RBP: ffff8806fefd9ee0 R08: 0000000000000000 R09: 0000000000000000
[27655.534896] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88070bdab1d0
[27655.534912] R13: ffff88070bdab1d0 R14: ffff8806fefb4ac0 R15: ffff88070bdab1d0
[27655.534929] FS:  00007f3cc7948a00(0000) GS:ffff88081ee00000(0000) knlGS:0000000000000000
[27655.534948] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[27655.534962] CR2: 00000000002000d4 CR3: 00000006fee5a000 CR4: 00000000001407e0
[27655.534979] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[27655.534995] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[27655.535012] Stack:
[27655.535017]  ffffffff81200c8e ffff88070bdaaf88 ffff8806fefd9f18 ffffffff81123afc
[27655.535038]  ffff8806fefd9f58 0000000000000001 00007fff4e646a10 ffffffffffffff92
[27655.535058]  00007f3ccc655600 ffff8806fefd9f40 ffffffff8102769d 000000002ef3912a
[27655.535078] Call Trace:
[27655.535088]  [<ffffffff81200c8e>] ? path_put+0x1e/0x30
[27655.535103]  [<ffffffff81123afc>] __audit_syscall_exit+0x11c/0x2a0
[27655.535120]  [<ffffffff8102769d>] syscall_trace_leave+0x8d/0x140
[27655.535136]  [<ffffffff81756547>] int_check_syscall_exit_work+0x34/0x3d
[27655.535152] Code: 00 00 00 00 00 00 00 e8 f2 1e e9 ff 4c 89 e7 e8 8a c3 ee ff e9 fa fe ff ff 0f 1f 44 00 00 0f 1f 44 00 00 48 85 ff 48 89 f8 74 1a <44> 8b 88 d4 00 00 00 55 48 8d 7f e0 48 89 e5 45 85 c9 75 08 e8 
[27655.535245] RIP  [<ffffffff81219f7d>] mntput+0xd/0x40
[27655.535259]  RSP <ffff8806fefd9ed0>
[27655.535267] CR2: 00000000002000d4
[27655.541177] ---[ end trace c6a84118ea296efb ]---
Comment 1 Andrew Morton 2013-11-27 04:49:41 UTC
(switched to email.  Please respond via emailed reply-to-all, not via the
bugzilla web interface).

mntput() went splat in 3.12.

On Wed, 27 Nov 2013 04:29:05 +0000 bugzilla-daemon@bugzilla.kernel.org wrote:

> https://bugzilla.kernel.org/show_bug.cgi?id=65921
> 
>             Bug ID: 65921
>            Summary: BUG: unable to handle kernel paging request at
>                     00000000002000d4
>            Product: Memory Management
>            Version: 2.5
>     Kernel Version: 3.12
>           Hardware: All
>                 OS: Linux
>               Tree: Mainline
>             Status: NEW
>           Severity: normal
>           Priority: P1
>          Component: Page Allocator
>           Assignee: akpm@linux-foundation.org
>           Reporter: mikhail.v.gavrilov@gmail.com
>         Regression: No
> 
> Created attachment 116361 [details]
>   --> https://bugzilla.kernel.org/attachment.cgi?id=116361&action=edit
> dmesg output
> 
> [27655.534370] BUG: unable to handle kernel paging request at
> 00000000002000d4
> [27655.534412] IP: [<ffffffff81219f7d>] mntput+0xd/0x40
> [27655.534430] PGD 5e6e64067 PUD 0 
> [27655.534454] Oops: 0000 [#1] SMP 
> [27655.534464] Modules linked in: rfcomm nls_utf8 vfat fat isofs fuse
> nf_conntrack_netbios_ns nf_conntrack_broadcast ipt_MASQUERADE ip6t_REJECT
> xt_conntrack cfg80211 ebtable_nat ebtable_broute bridge stp llc
> ebtable_filter
> ebtables ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6
> ip6table_mangle ip6table_security ip6table_raw ip6table_filter ip6_tables
> iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack
> iptable_mangle iptable_security iptable_raw bnep iTCO_wdt iTCO_vendor_support
> ppdev joydev x86_pkg_temp_thermal coretemp cdc_ncm kvm_intel option usbnet
> kvm
> usb_wwan crct10dif_pclmul crc32_pclmul btusb crc32c_intel bluetooth
> ghash_clmulni_intel rfkill microcode snd_hda_codec_realtek snd_hda_codec_hdmi
> snd_hda_intel snd_hda_codec snd_hwdep serio_raw snd_seq snd_seq_device
> [27655.534682]  snd_pcm r8169 mii snd_page_alloc snd_timer lpc_ich snd mei_me
> i2c_i801 mfd_core soundcore mei shpchp parport_pc parport binfmt_misc nfsd
> auth_rpcgss nfs_acl lockd sunrpc hid_logitech_dj usb_storage i915
> i2c_algo_bit
> drm_kms_helper drm i2c_core video
> [27655.534757] CPU: 1 PID: 3442 Comm: chrome Not tainted
> 3.12.0-2.fc21.x86_64+debug #1
> [27655.534775] Hardware name: Gigabyte Technology Co., Ltd.
> Z87M-D3H/Z87M-D3H,
> BIOS F8 08/03/2013
> [27655.534796] task: ffff8806fefb4ac0 ti: ffff8806fefd8000 task.ti:
> ffff8806fefd8000
> [27655.534814] RIP: 0010:[<ffffffff81219f7d>]  [<ffffffff81219f7d>]
> mntput+0xd/0x40
> [27655.534833] RSP: 0018:ffff8806fefd9ed0  EFLAGS: 00010206
> [27655.534846] RAX: 0000000000200000 RBX: ffff88070bdab1e8 RCX:
> ffff8806fefd8000
> [27655.534863] RDX: 0000000000000080 RSI: ffffffffffffff92 RDI:
> 0000000000200000
> [27655.534879] RBP: ffff8806fefd9ee0 R08: 0000000000000000 R09:
> 0000000000000000
> [27655.534896] R10: 0000000000000001 R11: 0000000000000001 R12:
> ffff88070bdab1d0
> [27655.534912] R13: ffff88070bdab1d0 R14: ffff8806fefb4ac0 R15:
> ffff88070bdab1d0
> [27655.534929] FS:  00007f3cc7948a00(0000) GS:ffff88081ee00000(0000)
> knlGS:0000000000000000
> [27655.534948] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [27655.534962] CR2: 00000000002000d4 CR3: 00000006fee5a000 CR4:
> 00000000001407e0
> [27655.534979] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
> 0000000000000000
> [27655.534995] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
> 0000000000000400
> [27655.535012] Stack:
> [27655.535017]  ffffffff81200c8e ffff88070bdaaf88 ffff8806fefd9f18
> ffffffff81123afc
> [27655.535038]  ffff8806fefd9f58 0000000000000001 00007fff4e646a10
> ffffffffffffff92
> [27655.535058]  00007f3ccc655600 ffff8806fefd9f40 ffffffff8102769d
> 000000002ef3912a
> [27655.535078] Call Trace:
> [27655.535088]  [<ffffffff81200c8e>] ? path_put+0x1e/0x30
> [27655.535103]  [<ffffffff81123afc>] __audit_syscall_exit+0x11c/0x2a0
> [27655.535120]  [<ffffffff8102769d>] syscall_trace_leave+0x8d/0x140
> [27655.535136]  [<ffffffff81756547>] int_check_syscall_exit_work+0x34/0x3d
> [27655.535152] Code: 00 00 00 00 00 00 00 e8 f2 1e e9 ff 4c 89 e7 e8 8a c3 ee
> ff e9 fa fe ff ff 0f 1f 44 00 00 0f 1f 44 00 00 48 85 ff 48 89 f8 74 1a <44>
> 8b
> 88 d4 00 00 00 55 48 8d 7f e0 48 89 e5 45 85 c9 75 08 e8 
> [27655.535245] RIP  [<ffffffff81219f7d>] mntput+0xd/0x40
> [27655.535259]  RSP <ffff8806fefd9ed0>
> [27655.535267] CR2: 00000000002000d4
> [27655.541177] ---[ end trace c6a84118ea296efb ]---
> 
> -- 
> You are receiving this mail because:
> You are the assignee for the bug.
Comment 2 Alan 2013-12-03 15:35:37 UTC
We seem to have a pile of 'Mikhael' reports all consistent with random memory corruption and possibly h/w bitflips ?
Comment 3 Alan 2013-12-18 14:40:01 UTC

*** This bug has been marked as a duplicate of bug 64521 ***