BUG: unable to handle kernel paging request at ffffc7ff81000398(sys_kexec_load)
From: Sasha Levin
Date: Sat Jan 21 2012 - 23:06:45 EST
Hi All,
I got the following BUG() while running trinity within KVM tool.
It looks like the result of a kexec_load(), but I couldn't find any mention of it in the logs - which is strange since logs are supposed to be flushed before actual syscall runs.
[ 3515.829231] BUG: unable to handle kernel paging request at ffffc7ff81000398
[ 3515.830041] IP: [<ffffffff81077281>] native_set_pte+0x1/0x10
[ 3515.830041] PGD 0
[ 3515.830041] Oops: 0002 [#1] PREEMPT SMP
[ 3515.830041] CPU 0
[ 3515.830041] Pid: 17125, comm: trinity Not tainted 3.2.0-next-20120119-sasha-00001-gfaa12a9-dirty #129
[ 3515.830041] RIP: 0010:[<ffffffff81077281>] [<ffffffff81077281>] native_set_pte+0x1/0x10
[ 3515.830041] RSP: 0018:ffff8800066a7e48 EFLAGS: 00010282
[ 3515.830041] RAX: 00003ffffffff000 RBX: ffff880005deb040 RCX: 00003ffffffff000
[ 3515.830041] RDX: 00003fff81000000 RSI: 0000000006657163 RDI: ffffc7ff81000398
[ 3515.830041] RBP: ffff8800066a7ed8 R08: ffffea0000199de0 R09: ffff88000ff15140
[ 3515.830041] R10: 0000000005deb000 R11: 0000000000000001 R12: 0000000000000398
[ 3515.830041] R13: 0000000006657000 R14: 0000008000000000 R15: 0001000000000000
[ 3515.830041] FS: 00007fc64b475700(0000) GS:ffff880013a00000(0000) knlGS:0000000000000000
[ 3515.830041] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 3515.830041] CR2: ffffc7ff81000398 CR3: 0000000006749000 CR4: 00000000000406f0
[ 3515.830041] DR0: ffffffff810aaee0 DR1: 0000000000000000 DR2: 0000000000000000
[ 3515.830041] DR3: 0000000000000000 DR6: 00000000ffff4ff0 DR7: 0000000000000600
[ 3515.830041] Process trinity (pid: 17125, threadinfo ffff8800066a6000, task ffff880005f90000)
[ 3515.830041] Stack:
[ 3515.830041] ffff8800066a7ed8 ffffffff81071d06 ffff8800066a7e78 ffff88000ff15000
[ 3515.830041] ffff88000b149000 ffff880006656000 ffff880006656008 0000008000000000
[ 3515.830041] 0000008000000000 0000000014000000 ffff88000ff15000 ffff88000b149008
[ 3515.830041] Call Trace:
[ 3515.830041] [<ffffffff81071d06>] ? machine_kexec_prepare+0x636/0x820
[ 3515.830041] [<ffffffff8111bb68>] ? sys_kexec_load+0x98/0x590
[ 3515.830041] [<ffffffff8111bbd2>] sys_kexec_load+0x102/0x590
[ 3515.830041] [<ffffffff82583d5d>] ? retint_swapgs+0x13/0x1b
[ 3515.830041] [<ffffffff8183c29e>] ? trace_hardirqs_on_thunk+0x3a/0x3f
[ 3515.830041] [<ffffffff82584639>] system_call_fastpath+0x16/0x1b
[ 3515.830041] [<ffffffff81001001>] ? hypercall_page+0x1/0x1000
[ 3515.830041] Code: 66 2e 0f 1f 84 00 00 00 00 00 55 48 8b 46 18 48 89 e5 48 89 47 04 c9 c3 66 90 55 48 89 e5 0f 01 f8 c9 c3 0f 1f 80 00 00 00 00 55 <48> 89 37 48 89 e5 c9 c3 0f 1f 80 00 00 00 00 55 48 89 37 48 89
[ 3515.830041] RIP [<ffffffff81077281>] native_set_pte+0x1/0x10
[ 3515.830041] RSP <ffff8800066a7e48>
[ 3515.830041] CR2: ffffc7ff81000398
[ 3515.830041] ---[ end trace 9813cf5a73b6d8b6 ]---
[ 3515.830041] BUG: sleeping function called from invalid context at kernel/rwsem.c:21
[ 3515.830041] in_atomic(): 0, irqs_disabled(): 1, pid: 17125, name: trinity
[ 3515.830041] INFO: lockdep is turned off.
[ 3515.830041] irq event stamp: 668
[ 3515.830041] hardirqs last enabled at (667): [<ffffffff8116fb35>] get_page_from_freelist+0x465/0x8d0
[ 3515.830041] hardirqs last disabled at (668): [<ffffffff82584266>] error_sti+0x5/0x6
[ 3515.830041] softirqs last enabled at (664): [<ffffffff810b3243>] __do_softirq+0x133/0x180
[ 3515.830041] softirqs last disabled at (641): [<ffffffff82585b6c>] call_softirq+0x1c/0x30
[ 3515.830041] Pid: 17125, comm: trinity Tainted: G D 3.2.0-next-20120119-sasha-00001-gfaa12a9-dirty #129
[ 3515.830041] Call Trace:
[ 3515.830041] [<ffffffff81109fc0>] ? print_irqtrace_events+0xd0/0xe0
[ 3515.830041] [<ffffffff810e1e29>] __might_sleep+0x149/0x200
[ 3515.830041] [<ffffffff82580ef5>] down_read+0x25/0x90
[ 3515.830041] [<ffffffff810bfd6f>] exit_signals+0x1f/0x140
[ 3515.830041] [<ffffffff810b0a8d>] do_exit+0xbd/0x950
[ 3515.830041] [<ffffffff810ad8f7>] ? kmsg_dump+0x87/0x250
[ 3515.830041] [<ffffffff8257f9dd>] ? printk+0x63/0x65
[ 3515.830041] [<ffffffff8104eda2>] oops_end+0xc2/0x110
[ 3515.830041] [<ffffffff8107cb92>] no_context+0x122/0x2e0
[ 3515.830041] [<ffffffff8107ce7d>] __bad_area_nosemaphore+0x12d/0x230
[ 3515.830041] [<ffffffff8107cf8e>] bad_area_nosemaphore+0xe/0x10
[ 3515.830041] [<ffffffff8107dc0f>] do_page_fault+0x41f/0x4d0
[ 3515.830041] [<ffffffff8117081e>] ? __alloc_pages_nodemask+0x14e/0x910
[ 3515.830041] [<ffffffff81076d11>] do_async_page_fault+0x31/0x90
[ 3515.830041] [<ffffffff82584055>] async_page_fault+0x25/0x30
[ 3515.830041] [<ffffffff81077281>] ? native_set_pte+0x1/0x10
[ 3515.830041] [<ffffffff81071d06>] ? machine_kexec_prepare+0x636/0x820
[ 3515.830041] [<ffffffff8111bb68>] ? sys_kexec_load+0x98/0x590
[ 3515.830041] [<ffffffff8111bbd2>] sys_kexec_load+0x102/0x590
[ 3515.830041] [<ffffffff82583d5d>] ? retint_swapgs+0x13/0x1b
[ 3515.830041] [<ffffffff8183c29e>] ? trace_hardirqs_on_thunk+0x3a/0x3f
[ 3515.830041] [<ffffffff82584639>] system_call_fastpath+0x16/0x1b
[ 3515.830041] [<ffffffff81001001>] ? hypercall_page+0x1/0x1000
--
Sasha.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/