Bug 1326012

Summary: [abrt] kernel paging request at __free_pages
Product: [Fedora] Fedora Reporter: Fabrício Godoy <skarllot>
Component: kernelAssignee: Kernel Maintainer List <kernel-maint>
Status: CLOSED INSUFFICIENT_DATA QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 23CC: gansalmon, itamar, jonathan, kernel-maint, madhu.chinakonda, mchehab
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Unspecified   
URL: https://retrace.fedoraproject.org/faf/reports/bthash/ec5acfed5260d9ee7c6b42904046ec68795c58cb
Whiteboard: abrt_hash:e23ec26126a37d4c3db18ae65dfa9ba4553204bf;VARIANT_ID=workstation;
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-10-26 17:00:10 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Attachments:
Description Flags
File: dmesg none

Description Fabrício Godoy 2016-04-11 15:14:50 UTC
Description of problem:
Stacktrace on booting, but the system appears to be working without problems.

Additional info:
reporter:       libreport-2.6.4
BUG: unable to handle kernel paging request at 0000000011254c5c
IP: [<ffffffff811b4f75>] __free_pages+0x5/0x40
PGD 0 
Oops: 0000 [#1] SMP 
Modules linked in: acpi_cpufreq(-) pcc_cpufreq(-) tpm_tis tpm i2c_designware_platform(+) i2c_designware_core nfsd auth_rpcgss nfs_acl lockd grace sunrpc binfmt_misc dm_crypt rtsx_usb_sdmmc hid_multitouch rtsx_usb i915 amdgpu crct10dif_pclmul crc32_pclmul crc32c_intel ttm i2c_algo_bit drm_kms_helper serio_raw drm 8021q garp stp llc mrp r8169 mii sdhci_acpi sdhci mmc_core video i2c_hid fjes
CPU: 3 PID: 1165 Comm: systemd-udevd Not tainted 4.4.6-301.fc23.x86_64 #1
Hardware name: Dell Inc. Inspiron 5548/0YDTG3, BIOS A05 07/27/2015
task: ffff8804476b3c00 ti: ffff88044a404000 task.ti: ffff88044a404000
RIP: 0010:[<ffffffff811b4f75>]  [<ffffffff811b4f75>] __free_pages+0x5/0x40
RSP: 0018:ffff88044a407ce8  EFLAGS: 00010206
RAX: ffff88008eaf1740 RBX: 0000000000000003 RCX: 0000000000000000
RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000011254c40
RBP: ffff88044a407d08 R08: ffffea00112c1aa0 R09: 0000000000000004
R10: ffffea00023abc40 R11: ffffffff81d3af80 R12: ffff88008eaf1d80
R13: 0000000000000001 R14: ffff88044a407dc0 R15: ffffc90001d6d000
FS:  00007fb4e37ea8c0(0000) GS:ffff88045ecc0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000011254c5c CR3: 000000044b113000 CR4: 00000000003406e0
Stack:
 ffffffff811eff0d ffff88044a407ea0 ffffffffa04463d8 ffffffffffffffef
 ffff88044a407d20 ffffffff811efffe ffff88044a407ea0 ffff88044a407e88
 ffffffff8112882e ffff88044a407da8 ffffffff811ee57c 0000000000000000
Call Trace:
 [<ffffffff811eff0d>] ? __vunmap+0x5d/0xe0
 [<ffffffff811efffe>] vfree+0x2e/0x70
 [<ffffffff8112882e>] load_module+0x18e/0x2680
 [<ffffffff811ee57c>] ? alloc_vmap_area+0x2fc/0x360
 [<ffffffff811ef2e6>] ? vmap_page_range_noflush+0x246/0x350
 [<ffffffff811ef426>] ? map_vm_area+0x36/0x50
 [<ffffffff811f03a6>] ? __vmalloc_node_range+0x196/0x2c0
 [<ffffffff8112adea>] ? SYSC_init_module+0xca/0x190
 [<ffffffff8112ae69>] SYSC_init_module+0x149/0x190
 [<ffffffff8112af9e>] SyS_init_module+0xe/0x10
 [<ffffffff817a05ae>] entry_SYSCALL_64_fastpath+0x12/0x71
Code: 49 8b 0f 49 8b 7f 08 49 83 c7 18 44 89 e2 48 89 de ff d1 49 8b 0f 48 85 c9 75 e8 eb 93 f3 c3 0f 1f 80 00 00 00 00 0f 1f 44 00 00 <8b> 47 1c 55 48 89 e5 85 c0 74 1c f0 ff 4f 1c 74 02 5d c3 85 f6 
RIP  [<ffffffff811b4f75>] __free_pages+0x5/0x40
 RSP <ffff88044a407ce8>
CR2: 0000000011254c5c

Comment 1 Fabrício Godoy 2016-04-11 15:14:59 UTC
Created attachment 1146017 [details]
File: dmesg

Comment 2 Laura Abbott 2016-09-23 19:54:54 UTC
*********** MASS BUG UPDATE **************
 
We apologize for the inconvenience.  There is a large number of bugs to go through and several of them have gone stale.  Due to this, we are doing a mass bug update across all of the Fedora 23 kernel bugs.
 
Fedora 23 has now been rebased to 4.7.4-100.fc23.  Please test this kernel update (or newer) and let us know if you issue has been resolved or if it is still present with the newer kernel.
 
If you have moved on to Fedora 24 or 25, and are still experiencing this issue, please change the version to Fedora 24 or 25.
 
If you experience different issues, please open a new bug report for those.

Comment 3 Laura Abbott 2016-10-26 17:00:10 UTC
*********** MASS BUG UPDATE **************
This bug is being closed with INSUFFICIENT_DATA as there has not been a response in 4 weeks. If you are still experiencing this issue, please reopen and attach the relevant data from the latest kernel you are running and any data that might have been requested previously.