Re: [Bug 200271] New: BUG: unable to handle kernel paging request at fffff1e034000208

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



(switched to email.  Please respond via emailed reply-to-all, not via the
bugzilla web interface).

Thanks.  It might be a KASAN issue.  If nobody can spot the bug in the
next few days, we may ask you to perform a bisection search to identify
the faulty commit.


On Mon, 25 Jun 2018 13:51:37 +0000 bugzilla-daemon@xxxxxxxxxxxxxxxxxxx wrote:

> https://bugzilla.kernel.org/show_bug.cgi?id=200271
> 
>             Bug ID: 200271
>            Summary: BUG: unable to handle kernel paging request at
>                     fffff1e034000208
>            Product: Memory Management
>            Version: 2.5
>     Kernel Version: v4.18-rc2
>           Hardware: All
>                 OS: Linux
>               Tree: Mainline
>             Status: NEW
>           Severity: normal
>           Priority: P1
>          Component: Page Allocator
>           Assignee: akpm@xxxxxxxxxxxxxxxxxxxx
>           Reporter: icytxw@xxxxxxxxx
>         Regression: No
> 
> Hi, 
> In linux kernel v4.18-rc2 exists a paging request error.
> 
> BUG: unable to handle kernel paging request at fffff1e034000208
> PGD 0 P4D 0 
> Oops: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN PTI
> CPU: 0 PID: 2708 Comm: sshd Not tainted 4.18.0-rc1 #2
> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
> rel-1.10.2-0-g5f4c7b1-prebuilt.qemu-project.org 04/01/2014
> RIP: 0010:__read_once_size include/linux/compiler.h:188 [inline]
> RIP: 0010:compound_head include/linux/page-flags.h:142 [inline]
> RIP: 0010:virt_to_head_page include/linux/mm.h:640 [inline]
> RIP: 0010:qlink_to_cache mm/kasan/quarantine.c:127 [inline]
> RIP: 0010:qlist_free_all+0xb1/0x190 mm/kasan/quarantine.c:163
> Code: 75 bf b9 00 00 00 80 4c 89 fa 48 01 c1 48 0f 42 15 f4 68 2a 03 48 01 ca
> 48 c1 ea 0c 48 c1 e2 06 4e 8d 2c 32 49 83 fd f8 74 71 <49> 8b 4d 08 48 8d 71 ff
> 83 e1 01 4c 0f 45 ee 4d 85 ed 74 45 49 8b 
> RSP: 0018:ffff8800692f7570 EFLAGS: 00010293
> RAX: 0001800d0000800d RBX: 0000000000000000 RCX: 0001800d8000800d
> RDX: 000007e034000200 RSI: ffffea00019b11c0 RDI: ffff8800695ffb40
> RBP: ffff8800692f75a8 R08: 0000000080170010 R09: ffffffff8176d6dd
> R10: ffff8800692f7520 R11: fffffbfff0941800 R12: ffff8800692f75c0
> R13: fffff1e034000200 R14: ffffea0000000000 R15: 000077ff80000000
> FS:  00007fa739b147c0(0000) GS:ffff88006c800000(0000) knlGS:0000000000000000
> CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> CR2: fffff1e034000208 CR3: 0000000068a74000 CR4: 00000000000006f0
> Call Trace:
>  quarantine_reduce+0x1e4/0x290 mm/kasan/quarantine.c:259
>  kasan_kmalloc+0xca/0xe0 mm/kasan/kasan.c:538
>  kasan_slab_alloc+0x11/0x20 mm/kasan/kasan.c:490
>  slab_post_alloc_hook mm/slab.h:444 [inline]
>  slab_alloc_node mm/slub.c:2708 [inline]
>  kmem_cache_alloc_node+0x163/0x360 mm/slub.c:2744
>  __alloc_skb+0xe5/0x6d0 net/core/skbuff.c:193
>  alloc_skb_fclone include/linux/skbuff.h:1029 [inline]
>  sk_stream_alloc_skb+0x13d/0x890 net/ipv4/tcp.c:864
>  tcp_sendmsg_locked+0x12c0/0x3ce0 net/ipv4/tcp.c:1279
>  tcp_sendmsg+0x34/0x50 net/ipv4/tcp.c:1436
>  inet_sendmsg+0x103/0x490 net/ipv4/af_inet.c:798
>  sock_sendmsg_nosec net/socket.c:645 [inline]
>  sock_sendmsg+0xf9/0x180 net/socket.c:655
>  sock_write_iter+0x254/0x4a0 net/socket.c:924
>  call_write_iter include/linux/fs.h:1795 [inline]
>  new_sync_write fs/read_write.c:474 [inline]
>  __vfs_write+0x405/0x820 fs/read_write.c:487
>  vfs_write+0x1aa/0x630 fs/read_write.c:549
>  ksys_write+0xde/0x1c0 fs/read_write.c:598
>  __do_sys_write fs/read_write.c:610 [inline]
>  __se_sys_write fs/read_write.c:607 [inline]
>  __x64_sys_write+0x81/0xd0 fs/read_write.c:607
>  do_syscall_64+0xb8/0x3a0 arch/x86/entry/common.c:290
>  entry_SYSCALL_64_after_hwframe+0x49/0xbe
> RIP: 0033:0x7fa737eae370
> Code: 73 01 c3 48 8b 0d c8 4a 2b 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea
> 90 90 83 3d 85 a2 2b 00 00 75 10 b8 01 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31
> c3 48 83 ec 08 e8 0e 8a 01 00 48 89 04 24 
> RSP: 002b:00007fffd34e67e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
> RAX: ffffffffffffffda RBX: 0000000000004028 RCX: 00007fa737eae370
> RDX: 0000000000004028 RSI: 000055ac329d4ea0 RDI: 0000000000000003
> RBP: 000055ac329d4ea0 R08: 0000000000000001 R09: 0101010101010101
> R10: 0000000000000008 R11: 0000000000000246 R12: 00007fffd34e684c
> R13: 000055ac321a8fb4 R14: 0000000000000028 R15: 000055ac321aaca0
> Modules linked in:
> Dumping ftrace buffer:
>    (ftrace buffer empty)
> CR2: fffff1e034000208
> ---[ end trace 3fb4ab829d4ae198 ]---
> RIP: 0010:__read_once_size include/linux/compiler.h:188 [inline]
> RIP: 0010:compound_head include/linux/page-flags.h:142 [inline]
> RIP: 0010:virt_to_head_page include/linux/mm.h:640 [inline]
> RIP: 0010:qlink_to_cache mm/kasan/quarantine.c:127 [inline]
> RIP: 0010:qlist_free_all+0xb1/0x190 mm/kasan/quarantine.c:163
> Code: 75 bf b9 00 00 00 80 4c 89 fa 48 01 c1 48 0f 42 15 f4 68 2a 03 48 01 ca
> 48 c1 ea 0c 48 c1 e2 06 4e 8d 2c 32 49 83 fd f8 74 71 <49> 8b 4d 08 48 8d 71 ff
> 83 e1 01 4c 0f 45 ee 4d 85 ed 74 45 49 8b 
> RSP: 0018:ffff8800692f7570 EFLAGS: 00010293
> RAX: 0001800d0000800d RBX: 0000000000000000 RCX: 0001800d8000800d
> RDX: 000007e034000200 RSI: ffffea00019b11c0 RDI: ffff8800695ffb40
> RBP: ffff8800692f75a8 R08: 0000000080170010 R09: ffffffff8176d6dd
> R10: ffff8800692f7520 R11: fffffbfff0941800 R12: ffff8800692f75c0
> R13: fffff1e034000200 R14: ffffea0000000000 R15: 000077ff80000000
> FS:  00007fa739b147c0(0000) GS:ffff88006c800000(0000) knlGS:0000000000000000
> CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> CR2: fffff1e034000208 CR3: 0000000068a74000 CR4: 00000000000006f0
> 
> -- 
> You are receiving this mail because:
> You are the assignee for the bug.




[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Bugtraq]     [Linux OMAP]     [Linux MIPS]     [eCos]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux