BUG: unable to handle kernel paging request at virtual addre
BUG: unable to handle kernel paging request at virtual address 031c03d8
printing eip:
c015a51b
18361000 -> *pde = 00000004:0b1b2027
1464f000 -> *pme = 00000000:00000000
Oops: 0000 [#1]
SMP
Modules linked in:
CPU: 0
EIP: 0061:[<c015a51b>] Not tainted VLI
EFLAGS: 00010002 (2.6.18.8-domU-linode7 #1)
EIP is at free_block+0x6d/0xfe
eax: 7936743d ebx: c1539c94 ecx: 0000000b edx: 031c03d8
esi: e1719580 edi: c153c780 ebp: c1539c94 esp: c157ff04
ds: 007b es: 007b ss: 0069
Process events/0 (pid: 10, ti=c157e000 task=e17a1ab0 task.ti=c157e000)
Stack: c154aa14 0000000b 00000000 c1539c94 c1539c80 0000000b c1547fc0 c015a60f
00000000 00000000 00000000 c153c780 c1547fc0 c153c780 c1570840 00000000
c015a9b8 00000000 00000000 c144df80 c144df84 c012b82a 00000000 c1570840
Call Trace:
[<c015a60f>] drain_array+0x63/0xde
[<c015a9b8>] cache_reap+0x47/0x137
[<c012b82a>] run_workqueue+0x71/0xe5
[<c015a971>] cache_reap+0x0/0x137
[<c012ba76>] worker_thread+0xef/0x128
[<c011746c>] default_wake_function+0x0/0xc
[<c012b987>] worker_thread+0x0/0x128
[<c012e89a>] kthread+0xde/0xe2
[<c012e7bc>] kthread+0x0/0xe2
[<c0102b75>] kernel_thread_helper+0x5/0xb
Code: 08 01 83 c5 04 8b 44 24 08 39 44 24 04 74 c0 8b 75 00 8d 96 00 00 00 40 c1 ea 0c c1 e2 05 03 15 a8 2a 5e c0 8b 02 f6 c4 40 75 7c <8b> 02 84 c0 79 7e 8b 4a 1c 8b 44 24 20 8b 5c 87 50 8b 11 8b 41
EIP: [<c015a51b>] free_block+0x6d/0xfe SS:ESP 0069:c157ff04
<1>BUG: unable to handle kernel paging request at virtual address 27a5c1c7
printing eip:
c01404d5
06389000 -> *pde = 00000005:d68e2027
04f1f000 -> *pme = 00000000:00000000
Oops: 0002 [#2]
SMP
Modules linked in:
CPU: 0
EIP: 0061:[<c01404d5>] Not tainted VLI
EFLAGS: 00010002 (2.6.18.8-domU-linode7 #1)
EIP is at __rmqueue+0x3e/0xe7
eax: c0515184 ebx: c0515184 ecx: c142e118 edx: 27a5c1c3
esi: c0514900 edi: 00000000 ebp: 00000000 esp: d9975dd0
ds: 007b es: 007b ss: 0069
Process php5-cgi (pid: 5569, ti=d9974000 task=d7429570 task.ti=d9974000)
Stack: c142e100 c051498c c0514900 c0514980 00000000 c01407e8 00000002 00000044
d1a86000 00000001 00000000 00000002 00000000 000280d2 c0515e28 00000001
0000001f 0000001b 00000004 00000000 c0515e28 d7429570 000280d2 00000000
Call Trace:
[<c01407e8>] get_page_from_freelist+0x26a/0x43b
[<c0140a08>] __alloc_pages+0x4f/0x2d2
[<c0142a33>] __pagevec_lru_add_active+0xef/0x12c
[<c014c9a5>] __handle_mm_fault+0xfc3/0x15db
[<c013de28>] __generic_file_aio_read+0x16e/0x243
[<c013bc05>] file_read_actor+0x0/0xc7
[<c015db64>] do_sync_read+0xc1/0x11c
[<c0131741>] hrtimer_run_queues+0xc1/0x193
[<c01103ea>] do_page_fault+0x10f/0xc70
[<c0120d86>] __do_softirq+0x8b/0x116
[<c015dfc5>] vfs_read+0x100/0x160
[<c015ea2e>] sys_read+0x41/0x6a
[<c01102db>] do_page_fault+0x0/0xc70
[<c01052e3>] error_code+0x2b/0x30
Code: 00 8d 90 84 08 00 00 8d 44 2d 00 01 e8 01 c0 01 c0 8d 1c 10 8b 0b 89 ef 39 d9 0f 84 85 00 00 00 8d 41 e8 89 04 24 8b 11 8b 41 04 <89> 42 04 89 10 c7 01 00 01 10 00 c7 41 04 00 02 20 00 0f ba 71
EIP: [<c01404d5>] __rmqueue+0x3e/0xe7 SS:ESP 0069:d9975dd0</c01404d5></c01052e3></c01102db></c015ea2e></c015dfc5></c0120d86></c01103ea></c0131741></c015db64></c013bc05></c013de28></c014c9a5></c0142a33></c0140a08></c01407e8></c01404d5></c015a51b></c0102b75></c012e7bc></c012e89a></c012b987></c011746c></c012ba76></c015a971></c012b82a></c015a9b8></c015a60f></c015a51b>
What does that all mean? I'm on a 4k block size. Username alucard. I'm on Xen and I was running 2.6.18.8-domU-linode7.
4 Replies
EDIT:
I had "latest 2.6" selected so I'm in -linode10 now
@Alucard:
I'm on a 4k block size.
If you manage to hit the 4k blocksize bug, it won't cause a panic, instead the kernel will remount your file system as read only.
Edit: Like this:
BUG: unable to handle kernel paging request at virtual address 00088b23
printing eip:
0cd0d000 -> *pde = 00000002:16782027
1acd1000 -> *pme = 00000000:00000000
Oops: 0002 [#1]
SMP
Modules linked in:
CPU: 0
EIP: 0061:[<c0161641>] Not tainted VLI
EFLAGS: 00010082 (2.6.18.8-linode10 #2)
EIP is at free_block+0x83/0xfe
eax: 00000000 ebx: e151ad00 ecx: d268c000 edx: 00088b1f
esi: d268c80c edi: e1505080 ebp: e15b0ee0 esp: cd733d24
ds: 007b es: 007b ss: 0069
Process collectinfo.pl (pid: 21262, ti=cd732000 task=e1908c30 task.ti=cd732000)
Stack: 00000000 0000001b 00000013 e15b0e94 e1505080 df7e8a00 e1510400 c01617ef
00000000 e15b0e80 0000001b e151ad00 e15b0e80 00000000 df7e8a00 00000000
c0161504 df7e8a98 df7e8a98 cd733da0 00000042 c017c40e df7e8aa0 c017ceaf
Call Trace:
[<c01617ef>] cache_flusharray+0x55/0xc1
[<c0161504>] kmem_cache_free+0xc8/0xee
[<c017c40e>] destroy_inode+0x2e/0x47
[<c017ceaf>] dispose_list+0x6e/0xcf
[<c017d0f6>] shrink_icache_memory+0x1e6/0x223
[<c014a8f0>] shrink_slab+0x111/0x186
[<c014bee4>] try_to_free_pages+0x137/0x1f3
[<c0147a37>] __alloc_pages+0x12e/0x2d2
[<c01539cc>] __handle_mm_fault+0xfd2/0x1664
[<c0173dcf>] do_path_lookup+0xab/0x28d
[<c013158b>] hrtimer_run_queues+0xc1/0x192
[<c011007a>] do_page_fault+0x10f/0xc70
[<c0120a96>] __do_softirq+0x8b/0x116
[<c0106bde>] do_IRQ+0x30/0x62
[<c034f87d>] evtchn_do_upcall+0xe5/0x1e5
[<c010ff6b>] do_page_fault+0x0/0xc70
[<c01052e3>] error_code+0x2b/0x30
Code: 00 40 c1 ea 0c c1 e2 05 03 15 a8 dc 5e c0 8b 02 f6 c4 40 75 7c 8b 02 84 c0 79 7e 8b 4a 1c 8b 44 24 20 8b 5c 87 50 8b 11 8b 41 04 <89> 42 04 89 10 c7 01 00 01 10 00 c7 41 04 00 02 20 00 2b 71 0c
EIP: [<c0161641>] free_block+0x83/0xfe SS:ESP 0069:cd733d24
<0>------------[ cut here ]------------
kernel BUG at mm/slab.c:595!
invalid opcode: 0000 [#2]
SMP
Modules linked in:
CPU: 2
EIP: 0061:[<c0161515>] Not tainted VLI
EFLAGS: 00210246 (2.6.18.8-linode10 #2)
EIP is at kmem_cache_free+0xd9/0xee
eax: 80080000 ebx: d2c5d0d4 ecx: e1505080 edx: c1258ba0
esi: c3b93000 edi: d2c5d03c ebp: d9d0df44 esp: d9d0deac
ds: 007b es: 007b ss: 0069
Process miniserv.pl (pid: 21158, ti=d9d0c000 task=e156ae70 task.ti=d9d0c000)
Stack: d2c5d0d4 c3b93000 c500b000 d9d0df44 c017c40e d2c5d0d4 c017c486 d8100c94
c017b107 00000000 c3b93000 c0174148 d8100c94 d9e6ed94 d9e6ed94 d8100d14
d8100c94 00000000 d9e6ed94 c154ec40 d13cf0a7 0000000c c500b011 00000010
Call Trace:
[<c017c40e>] destroy_inode+0x2e/0x47
[<c017c486>] iput+0x5f/0x6b
[<c017b107>] dput+0x69/0x12d
[<c0174148>] sys_renameat+0x197/0x1b9
[<c0171362>] pipe_readv+0x31c/0x3d6
[<c011007a>] do_page_fault+0x10f/0xc70
[<c017b129>] dput+0x8b/0x12d
[<c0166151>] __fput+0x120/0x174
[<c0174191>] sys_rename+0x27/0x2b
[<c0105137>] syscall_call+0x7/0xb
Code: f6 75 df 80 38 00 74 da 5b 5e 5f 5d e9 85 df 1e 00 89 da 89 c8 e8 96 02 00 00 8b 03 eb 99 0f 0b 6a 0d 96 dd 4c c0 e9 5f ff ff ff <0f> 0b 53 02 96 dd 4c c0 e9 49 ff ff ff 8b 52 0c e9 37 ff ff ff
EIP: [<c0161515>] kmem_cache_free+0xd9/0xee SS:ESP 0069:d9d0deac</c0161515></c0105137></c0174191></c0166151></c017b129></c011007a></c0171362></c0174148></c017b107></c017c486></c017c40e></c0161515></c0161641></c01052e3></c010ff6b></c034f87d></c0106bde></c0120a96></c011007a></c013158b></c0173dcf></c01539cc></c0147a37></c014bee4></c014a8f0></c017d0f6></c017ceaf></c017c40e></c0161504></c01617ef></c0161641>