Re: [Bug 65921] New: BUG: unable to handle kernel paging request at 00000000002000d4

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



(switched to email.  Please respond via emailed reply-to-all, not via the
bugzilla web interface).

mntput() went splat in 3.12.

On Wed, 27 Nov 2013 04:29:05 +0000 bugzilla-daemon@xxxxxxxxxxxxxxxxxxx wrote:

> https://bugzilla.kernel.org/show_bug.cgi?id=65921
> 
>             Bug ID: 65921
>            Summary: BUG: unable to handle kernel paging request at
>                     00000000002000d4
>            Product: Memory Management
>            Version: 2.5
>     Kernel Version: 3.12
>           Hardware: All
>                 OS: Linux
>               Tree: Mainline
>             Status: NEW
>           Severity: normal
>           Priority: P1
>          Component: Page Allocator
>           Assignee: akpm@xxxxxxxxxxxxxxxxxxxx
>           Reporter: mikhail.v.gavrilov@xxxxxxxxx
>         Regression: No
> 
> Created attachment 116361
>   --> https://bugzilla.kernel.org/attachment.cgi?id=116361&action=edit
> dmesg output
> 
> [27655.534370] BUG: unable to handle kernel paging request at 00000000002000d4
> [27655.534412] IP: [<ffffffff81219f7d>] mntput+0xd/0x40
> [27655.534430] PGD 5e6e64067 PUD 0 
> [27655.534454] Oops: 0000 [#1] SMP 
> [27655.534464] Modules linked in: rfcomm nls_utf8 vfat fat isofs fuse
> nf_conntrack_netbios_ns nf_conntrack_broadcast ipt_MASQUERADE ip6t_REJECT
> xt_conntrack cfg80211 ebtable_nat ebtable_broute bridge stp llc ebtable_filter
> ebtables ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6
> ip6table_mangle ip6table_security ip6table_raw ip6table_filter ip6_tables
> iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack
> iptable_mangle iptable_security iptable_raw bnep iTCO_wdt iTCO_vendor_support
> ppdev joydev x86_pkg_temp_thermal coretemp cdc_ncm kvm_intel option usbnet kvm
> usb_wwan crct10dif_pclmul crc32_pclmul btusb crc32c_intel bluetooth
> ghash_clmulni_intel rfkill microcode snd_hda_codec_realtek snd_hda_codec_hdmi
> snd_hda_intel snd_hda_codec snd_hwdep serio_raw snd_seq snd_seq_device
> [27655.534682]  snd_pcm r8169 mii snd_page_alloc snd_timer lpc_ich snd mei_me
> i2c_i801 mfd_core soundcore mei shpchp parport_pc parport binfmt_misc nfsd
> auth_rpcgss nfs_acl lockd sunrpc hid_logitech_dj usb_storage i915 i2c_algo_bit
> drm_kms_helper drm i2c_core video
> [27655.534757] CPU: 1 PID: 3442 Comm: chrome Not tainted
> 3.12.0-2.fc21.x86_64+debug #1
> [27655.534775] Hardware name: Gigabyte Technology Co., Ltd. Z87M-D3H/Z87M-D3H,
> BIOS F8 08/03/2013
> [27655.534796] task: ffff8806fefb4ac0 ti: ffff8806fefd8000 task.ti:
> ffff8806fefd8000
> [27655.534814] RIP: 0010:[<ffffffff81219f7d>]  [<ffffffff81219f7d>]
> mntput+0xd/0x40
> [27655.534833] RSP: 0018:ffff8806fefd9ed0  EFLAGS: 00010206
> [27655.534846] RAX: 0000000000200000 RBX: ffff88070bdab1e8 RCX:
> ffff8806fefd8000
> [27655.534863] RDX: 0000000000000080 RSI: ffffffffffffff92 RDI:
> 0000000000200000
> [27655.534879] RBP: ffff8806fefd9ee0 R08: 0000000000000000 R09:
> 0000000000000000
> [27655.534896] R10: 0000000000000001 R11: 0000000000000001 R12:
> ffff88070bdab1d0
> [27655.534912] R13: ffff88070bdab1d0 R14: ffff8806fefb4ac0 R15:
> ffff88070bdab1d0
> [27655.534929] FS:  00007f3cc7948a00(0000) GS:ffff88081ee00000(0000)
> knlGS:0000000000000000
> [27655.534948] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [27655.534962] CR2: 00000000002000d4 CR3: 00000006fee5a000 CR4:
> 00000000001407e0
> [27655.534979] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
> 0000000000000000
> [27655.534995] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
> 0000000000000400
> [27655.535012] Stack:
> [27655.535017]  ffffffff81200c8e ffff88070bdaaf88 ffff8806fefd9f18
> ffffffff81123afc
> [27655.535038]  ffff8806fefd9f58 0000000000000001 00007fff4e646a10
> ffffffffffffff92
> [27655.535058]  00007f3ccc655600 ffff8806fefd9f40 ffffffff8102769d
> 000000002ef3912a
> [27655.535078] Call Trace:
> [27655.535088]  [<ffffffff81200c8e>] ? path_put+0x1e/0x30
> [27655.535103]  [<ffffffff81123afc>] __audit_syscall_exit+0x11c/0x2a0
> [27655.535120]  [<ffffffff8102769d>] syscall_trace_leave+0x8d/0x140
> [27655.535136]  [<ffffffff81756547>] int_check_syscall_exit_work+0x34/0x3d
> [27655.535152] Code: 00 00 00 00 00 00 00 e8 f2 1e e9 ff 4c 89 e7 e8 8a c3 ee
> ff e9 fa fe ff ff 0f 1f 44 00 00 0f 1f 44 00 00 48 85 ff 48 89 f8 74 1a <44> 8b
> 88 d4 00 00 00 55 48 8d 7f e0 48 89 e5 45 85 c9 75 08 e8 
> [27655.535245] RIP  [<ffffffff81219f7d>] mntput+0xd/0x40
> [27655.535259]  RSP <ffff8806fefd9ed0>
> [27655.535267] CR2: 00000000002000d4
> [27655.541177] ---[ end trace c6a84118ea296efb ]---
> 
> -- 
> You are receiving this mail because:
> You are the assignee for the bug.
--
To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Linux Ext4 Filesystem]     [Union Filesystem]     [Filesystem Testing]     [Ceph Users]     [Ecryptfs]     [AutoFS]     [Kernel Newbies]     [Share Photos]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux Cachefs]     [Reiser Filesystem]     [Linux RAID]     [Samba]     [Device Mapper]     [CEPH Development]
  Powered by Linux