On Thu, Jul 09, 2015 at 04:11:41PM +0200, Thomas Gleixner wrote: > On Thu, 9 Jul 2015, Koehrer Mathias (ETAS/ESW5) wrote: > > BUG: unable to handle kernel NULL pointer dereference at 0000001c > > IP: [<c107fb62>] __try_to_take_rt_mutex+0x52/0x100 > > *pde = 00000000 > > Oops: 0000 [#1] PREEMPT SMP > > Modules linked in: rtpc_dma(O) es53xx(O) nfsd nfs lockd grace sunrpc bridge stp llc e100 mii e1000 e1000e igb i2c_algo_bit ixgbe mdio ptp pps_core dca kvm_intel kvm ecikm(O) i2c_i801 pcspkr i2c_core video backlight processor coretemp autofs4 reiserfs microcode sg sd_mod ahci libahci ehci_pci ehci_hcd xhci_pci xhci_hcd fan thermal_sys hwmon > > CPU: 0 PID: 1522 Comm: systemd-journal Tainted: G O 3.18.13-rt10-2 #2 > > Hardware name: Supermicro X9SAE/X9SAE, BIOS 2.0b 07/10/2013 > > task: dff76000 ti: f4760000 task.ti: f4760000 > > EIP: 0060:[<c107fb62>] EFLAGS: 00010282 CPU: 0 > > EIP is at __try_to_take_rt_mutex+0x52/0x100 > > EAX: 00000000 EBX: 00000000 ECX: f4761df4 EDX: 00000000 > > ESI: dff76000 EDI: dfdec944 EBP: f4761dd4 ESP: f4761dc4 > > DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 > > CR0: 80050033 CR2: f8b5cbc0 CR3: 344ad000 CR4: 001407d0 > > Stack: > > dff76000 dfdec944 dff764b0 f4761df4 f4761e28 c1404169 00000001 f4761fec > > f3ba9201 dff76000 dff764b0 dff76000 00000001 00000000 00000000 f4761e00 > > 00000000 00000000 dff76000 dfdec944 c1045b01 00000078 dff76000 f3bae000 > > Call Trace: > > [<c1404169>] rt_spin_lock_slowlock+0xf9/0x240 > > [<c1045b01>] ? pin_current_cpu+0x31/0x1a0 > > [<c1405567>] rt_spin_lock+0x27/0x30 > > [<c1051508>] __lock_task_sighand+0x38/0x70 > > [<c119768b>] proc_pid_status+0x33b/0x620 > > [<c1193312>] proc_single_show+0x42/0x80 > > [<c1163d12>] seq_read+0x82/0x380 > > [<c11283fa>] ? do_mmap_pgoff+0x27a/0x350 > > [<c1080abd>] ? rt_up_write+0xd/0x10 > > [<c1163c90>] ? seq_lseek+0x1c0/0x1c0 > > [<c1142684>] vfs_read+0x74/0x140 > > [<c1142ca6>] SyS_read+0x46/0x90 > > [<c1405c54>] sysenter_do_call+0x12/0x12 > > Code: 83 cb 01 f0 0f b1 1e 39 d0 75 ee 8b 5f 0c 31 c0 83 e3 fe 74 0c 83 c4 04 5b 5e 5f 5d c3 8d 74 26 00 8b 75 f0 85 c9 74 1d 8b 57 08 <3b> 7a 1c 0f 85 93 00 00 00 89 d8 39 d1 75 db 89 ca 89 f8 e8 c6 > > EIP: [<c107fb62>] __try_to_take_rt_mutex+0x52/0x100 SS:ESP 0068:f4761dc4 > > CR2: 000000000000001c > > ---[ end trace 0000000000 I was able to trigger a similar-looking OOPs; not sure if it provides any more meaningful data, but here it is: Unable to handle kernel NULL pointer dereference at virtual address 0000001c pgd = dd998000 [0000001c] *pgd=1da24831, *pte=00000000, *ppte=00000000 Internal error: Oops: 17 [#1] PREEMPT SMP ARM Modules linked in: ipv6 ehci_hcd CPU: 1 PID: 1169 Comm: busybox Not tainted 3.18.13-rt10-ni-00623-g6a5191f-dirty #8 task: ded1cac0 ti: dea78000 task.ti: dea78000 PC is at __try_to_take_rt_mutex+0x6c/0x150 LR is at rt_spin_lock_slowlock+0x10c/0x29c pc : [<c00583bc>] lr : [<c05291c0>] psr: a00d0013 sp : dea79d48 ip : 00000000 fp : dea79d64 r10: dea79d68 r9 : dea79d68 r8 : dea79d68 r7 : 00000000 r6 : 00000000 r5 : ded1cac0 r4 : dd93af04 r3 : 00000000 r2 : dea79d68 r1 : dd93af10 r0 : 00000000 Flags: NzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 18c5387d Table: 1d99804a DAC: 00000015 Process busybox (pid: 1169, stack limit = 0xdea78240) Stack: (0xdea79d48 to 0xdea7a000) 9d40: dd93af04 ded1cac0 dea78000 ded1cf50 dea79dbc dea79d68 9d60: c05291c0 c005835c 00000001 00000000 00000000 dea79d74 00000000 00000000 9d80: ded1cac0 dd93af04 dea79d01 00000078 dea79dac dd93aa00 debacac0 dd93af04 9da0: dea79e60 c0768138 00000001 000003ff dea79dcc dea79dc0 c052a9d8 c05290c0 9dc0: dea79dec dea79dd0 c0030110 c052a98c deb14580 debacac0 dee65180 deb14580 9de0: dea79eb4 dea79df0 c01675d8 c00300d4 c011f8dc c011aae4 dea79e14 dda5bb00 9e00: ded1cac0 df24a550 de921800 00000044 dea79e34 c012f8fc df41c600 ded9f180 9e20: dea79e44 dea79e30 c012f8fc 002da000 dea79ee8 de921800 dea79e54 dea79e48 9e40: beb7a178 b6e429f0 dea79e6c dea79e58 c0768138 c028f464 00000000 00000000 9e60: 60000013 dea79e70 00000000 00000000 00000000 00000000 6c706669 2e646775 9e80: 69746361 00006e6f 00001000 debacac0 dcafea40 dda5bb00 deb14580 c0768138 9ea0: dea79f78 000003ff dea79ecc dea79eb8 c01684a8 c01674f8 00000001 dcafea40 9ec0: dea79ef4 dea79ed0 c0162dd0 c0168490 c0162d7c 00000000 00000000 dea79f08 9ee0: 00000001 deb14580 dea79f44 dea79ef8 c0133a64 c0162d88 dea79f44 deb145b0 9f00: de921800 bec627d0 00000000 00000000 dea78000 dcafea40 dea79f3c 000003ff 9f20: de921800 bec627d0 dea79f78 000003ff dea78000 bec627d0 dea79f74 dea79f48 9f40: c011248c c0133888 c012d13c c012d0ac 00000000 00000000 de921800 de921800 9f60: 000003ff bec627d0 dea79fa4 dea79f78 c0112588 c01123fc 00000000 00000000 9f80: 0009a0a0 bec627d0 00000004 00000003 c000f384 00000000 00000000 dea79fa8 9fa0: c000f140 c0112548 0009a0a0 bec627d0 00000004 bec627d0 000003ff 00000000 9fc0: 0009a0a0 bec627d0 00000004 00000003 00081984 00000220 00099988 0000000b 9fe0: 00000000 bec62784 00076be4 b6e8612c 60000010 00000004 00000000 00000000 Backtrace: [<c0058350>] (__try_to_take_rt_mutex) from [<c05291c0>] (rt_spin_lock_slowlock+0x10c/0x29c) r7:ded1cf50 r6:dea78000 r5:ded1cac0 r4:dd93af04 [<c05290b4>] (rt_spin_lock_slowlock) from [<c052a9d8>] (rt_spin_lock+0x58/0x5c) r10:000003ff r9:00000001 r8:c0768138 r7:dea79e60 r6:dd93af04 r5:debacac0 r4:dd93aa00 [<c052a980>] (rt_spin_lock) from [<c0030110>] (__lock_task_sighand+0x48/0x78) [<c00300c8>] (__lock_task_sighand) from [<c01675d8>] (do_task_stat+0xec/0x85c) r7:deb14580 r6:dee65180 r5:debacac0 r4:deb14580 [<c01674ec>] (do_task_stat) from [<c01684a8>] (proc_tgid_stat+0x24/0x2c) r10:000003ff r9:dea79f78 r8:c0768138 r7:deb14580 r6:dda5bb00 r5:dcafea40 r4:debacac0 [<c0168484>] (proc_tgid_stat) from [<c0162dd0>] (proc_single_show+0x54/0xa4) [<c0162d7c>] (proc_single_show) from [<c0133a64>] (seq_read+0x1e8/0x468) r8:deb14580 r7:00000001 r6:dea79f08 r5:00000000 r4:00000000 r3:c0162d7c [<c013387c>] (seq_read) from [<c011248c>] (vfs_read+0x9c/0x14c) r10:bec627d0 r9:dea78000 r8:000003ff r7:dea79f78 r6:bec627d0 r5:de921800 r4:000003ff [<c01123f0>] (vfs_read) from [<c0112588>] (SyS_read+0x4c/0x8c) r10:bec627d0 r8:000003ff r7:de921800 r6:de921800 r5:00000000 r4:00000000 [<c011253c>] (SyS_read) from [<c000f140>] (ret_fast_syscall+0x0/0x30) r10:00000000 r8:c000f384 r7:00000003 r6:00000004 r5:bec627d0 r4:0009a0a0 Code: 1a000036 e3520000 0a000009 e5943008 (e593101c) ---[ end trace 0000000000000002 ]--- note: busybox[1169] exited with preempt_count 1 I hit it once before, but wasn't in any position to capture the logs. The two times I hit the oops were both at boot. I haven't seen this in (yet?) in 4.0.5-rt4. Josh
Attachment:
signature.asc
Description: PGP signature