Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 1457585 Details for
Bug 1598462
kernel 4.17.4, 4.17.5, 4.17.6 hang
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
hang occurrence 4 VB removed caught on netconsole
bz1598468_netconsole4_VirtualBox_removed.log (text/plain), 3.93 KB, created by
Didier G
on 2018-07-09 20:04:32 UTC
(
hide
)
Description:
hang occurrence 4 VB removed caught on netconsole
Filename:
MIME Type:
Creator:
Didier G
Created:
2018-07-09 20:04:32 UTC
Size:
3.93 KB
patch
obsolete
>[ 1451.503548] ------------[ cut here ]------------ >[ 1451.503562] kernel BUG at mm/page_alloc.c:2019! >[ 1451.503570] invalid opcode: 0000 [#1] SMP PTI >[ 1451.503574] Modules linked in: netconsole rfcomm fuse xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun nf_conntrack_netbios_ns nf_conntrack_broadcast xt_CT ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 xt_conntrack devlink ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack libcrc32c iptable_mangle iptable_raw iptable_security ebtable_filter ebtables ip6table_filter ip6_tables cmac bnep nct6775 hwmon_vid sunrpc vfat fat intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm eeepc_wmi asus_wmi sparse_keymap iTCO_wdt gpio_ich iTCO_vendor_support wmi_bmof irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel >[ 1451.503623] intel_cstate intel_uncore intel_rapl_perf snd_hda_codec_realtek snd_hda_codec_generic btusb btrtl btbcm snd_hda_codec_hdmi btintel snd_hda_intel bluetooth snd_hda_codec i2c_i801 lpc_ich snd_hda_core snd_hwdep snd_seq joydev ecdh_generic snd_seq_device snd_pcm rfkill snd_timer snd mei_me soundcore mei shpchp wmi video amdgpu chash gpu_sched uas usb_storage hid_logitech_hidpp radeon hid_logitech_dj i2c_algo_bit drm_kms_helper ttm drm crc32c_intel r8169 mii >[ 1451.503666] CPU: 2 PID: 2565 Comm: mount.ntfs Not tainted 4.17.4-200.fc28.x86_64 #1 >[ 1451.503668] Hardware name: System manufacturer System Product Name/P8Z77-V LE, BIOS 1104 03/18/2014 >[ 1451.503676] RIP: 0010:move_freepages_block+0x167/0x2e0 >[ 1451.503679] RSP: 0018:ffffa7d00ab83a30 EFLAGS: 00010002 >[ 1451.503682] RAX: ffff980a1efd0000 RBX: 0000000000100000 RCX: ffff980a1efd0680 >[ 1451.503685] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 >[ 1451.503688] RBP: 0000000000000000 R08: 0000000000000000 R09: ffff980a1efd0958 >[ 1451.503690] R10: ffffffffbce28824 R11: ffff980a1efcc000 R12: ffffc91783751800 >[ 1451.503693] R13: ffff980a1efd0680 R14: ffffa7d00ab83a94 R15: ffffc91783750000 >[ 1451.503696] FS: 00007f7ec825db80(0000) GS:ffff980a1ed00000(0000) knlGS:0000000000000000 >[ 1451.503700] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >[ 1451.503702] CR2: 00007f417f528000 CR3: 0000000199664005 CR4: 00000000000606e0 >[ 1451.503705] Call Trace: >[ 1451.503714] ? enqueue_entity+0xf6/0x680 >[ 1451.503718] steal_suitable_fallback+0x119/0x1b0 >[ 1451.503723] get_page_from_freelist+0x1034/0x16a0 >[ 1451.503728] __alloc_pages_nodemask+0x11e/0x2b0 >[ 1451.503733] __do_page_cache_readahead+0xf7/0x2f0 >[ 1451.503742] ? fuse_copy_one+0x3f/0x50 [fuse] >[ 1451.503747] ? fuse_copy_args+0x4f/0x140 [fuse] >[ 1451.503751] ondemand_readahead+0x1f4/0x2a0 >[ 1451.503756] generic_file_read_iter+0x749/0xcf0 >[ 1451.503769] ? fuse_dev_read+0x57/0x90 [fuse] >[ 1451.503773] __vfs_read+0x124/0x170 >[ 1451.503776] vfs_read+0x8a/0x140 >[ 1451.503779] ksys_pread64+0x61/0xa0 >[ 1451.503783] do_syscall_64+0x5b/0x160 >[ 1451.503787] entry_SYSCALL_64_after_hwframe+0x44/0xa9 >[ 1451.503790] RIP: 0033:0x7f7ec7c56654 >[ 1451.503791] RSP: 002b:00007ffde1537fb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 >[ 1451.503794] RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 00007f7ec7c56654 >[ 1451.503796] RDX: 0000000000020000 RSI: 000055c9aa1b8f30 RDI: 0000000000000003 >[ 1451.503798] RBP: 0000000000000000 R08: 0000000000000007 R09: 000055c9aa1d8f58 >[ 1451.503800] R10: 000000777e5f9000 R11: 0000000000000246 R12: 000000777e5f9000 >[ 1451.503801] R13: 000055c9aa1b8f30 R14: 00007f7ec7c44220 R15: 000055c9aa1345d0 >[ 1451.503803] Code: 40 57 38 bd 48 89 c6 48 c1 e8 33 83 e0 07 48 c1 ee 36 48 8d 3c 40 48 8d 04 b8 48 c1 e0 07 48 03 04 f5 40 57 38 bd 48 39 c1 74 17 <0f> 0b 45 31 e4 48 83 c4 28 44 89 e0 5b 5d 41 5c 41 5d 41 5e 41 >[ 1451.503828] RIP: move_freepages_block+0x167/0x2e0 RSP: ffffa7d00ab83a30 >[ 1451.503830] ---[ end trace 8afe00e23a3ff937 ]--- > >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1598462
:
1457113
|
1457115
|
1457583
| 1457585 |
1457611
|
1465416