Bug 847218 - [RHEL5.9] Kernel panic at put_page+0x2/0x34 with skb_release_data
Summary: [RHEL5.9] Kernel panic at put_page+0x2/0x34 with skb_release_data
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: kernel
Version: 5.9
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: rc
: ---
Assignee: Red Hat Kernel Manager
QA Contact: Red Hat Kernel QE team
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2012-08-10 07:22 UTC by Weibing Zhang
Modified: 2023-09-14 01:36 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-06-02 13:06:31 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Weibing Zhang 2012-08-10 07:22:39 UTC
Description of problem:
BUG: unable to handle kernel paging request at virtual address fffbd3e8 
 printing eip: 
c04611d9 
*pde = 00012067 
Oops: 0000 [#1] 
SMP  
last sysfs file: /devices/pci0000:00/0000:00:00.0/class 
Modules linked in: nfs nfs_acl autofs4 hidp rfcomm l2cap bluetooth lockd sunrpc be2iscsi ib_iser rdma_cm ib_cm iw_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp bnx2i cnic ipv6 xfrm_nalgo crypto_api uio cxgb3i libcxgbi cxgb3 8021q libiscsi_tcp libiscsi2 scsi_transport_iscsi2 scsi_transport_iscsi dm_multipath scsi_dh video backlight sbs power_meter hwmon i2c_ec dell_wmi wmi button battery asus_acpi ac parport_pc lp parport floppy virtio_net virtio_balloon pcspkr tpm_tis tpm tpm_bios serio_raw i2c_piix4 i2c_core virtio_pci virtio_ring virtio dm_raid45 dm_message dm_region_hash dm_mem_cache dm_snapshot dm_zero dm_mirror dm_log dm_mod ata_piix libata sd_mod scsi_mod ext3 jbd uhci_hcd ohci_hcd ehci_hcd 
CPU:    0 
EIP:    0060:[<c04611d9>]    Not tainted VLI 
EFLAGS: 00010203   (2.6.18-333.el5 #1)  
EIP is at put_page+0x2/0x34 
eax: fffbd3e8   ebx: 00000001   ecx: f7504400   edx: fffbd3e8 
esi: f74c2e00   edi: f09f8d9c   ebp: f6e74280   esp: f09f8bdc 
ds: 007b   es: 007b   ss: 0068 
Process cp (pid: 3026, ti=f09f8000 task=f686aaa0 task.ti=f09f8000) 
Stack: c05c3f33 f74c2e00 f6e74280 c05c3e01 00000010 c05e8736 00000010 fffffff2  
       c0600268 f09f8d9c 00000000 00000246 c05c113d 00000001 9a45100a 00000001  
       00000000 c0626a17 f6e74280 c05c1018 000000b0 00000000 c0600297 f09f8df0  
Call Trace: 
 [<c05c3f33>] skb_release_data+0x4c/0x7e 
 [<c05c3e01>] __kfree_skb+0xf/0x17 
 [<c05e8736>] ip_flush_pending_frames+0x33/0x94 
 [<c0600268>] udp_sendmsg+0x431/0x520 
 [<c05c113d>] lock_sock+0x8e/0x96 
 [<c0626a17>] _spin_lock_bh+0x8/0x18 
 [<c05c1018>] release_sock+0xc/0xa3 
 [<c0600297>] udp_sendmsg+0x460/0x520 
 [<c0605b4c>] inet_sendmsg+0x35/0x3f 
 [<c05be53d>] sock_sendmsg+0xd3/0x11d 
 [<c0437193>] autoremove_wake_function+0x0/0x2d 
 [<c0437193>] autoremove_wake_function+0x0/0x2d 
 [<c04647ef>] set_page_address+0xac/0x125 
 [<c046473c>] page_address+0x7a/0x81 
 [<c046473c>] page_address+0x7a/0x81 
 [<c05c043e>] kernel_sendmsg+0x27/0x35 
 [<f8c80e1c>] xs_send_tail+0x3f/0x46 [sunrpc] 
 [<f8c82208>] xs_udp_send_request+0x1f6/0x2a1 [sunrpc] 
 [<c05c11b6>] sock_no_sendpage+0x0/0x60 
 [<f8c80127>] xprt_transmit+0xbf/0x19e [sunrpc] 
 [<f8d390a1>] nfs4_xdr_enc_write+0x0/0xfd [nfs] 
 [<f8c7e387>] call_transmit+0x19d/0x1ca [sunrpc] 
 [<f8c8305c>] __rpc_execute+0x80/0x26a [sunrpc] 
 [<c042ee54>] sigprocmask+0xb0/0xce 
 [<f8d28f44>] nfs_execute_write+0x35/0x49 [nfs] 
 [<f8d2a309>] nfs_flush_one+0xb8/0x10d [nfs] 
 [<f8d2a251>] nfs_flush_one+0x0/0x10d [nfs] 
 [<f8d28bca>] nfs_flush_list+0x6f/0x132 [nfs] 
 [<f8d28cd2>] nfs_flush_inode+0x45/0x53 [nfs] 
 [<f8d2a571>] nfs_writepages+0x4c/0x88 [nfs] 
 [<c045fb01>] do_writepages+0x20/0x32 
 [<c045b5eb>] __filemap_fdatawrite_range+0x66/0x72 
 [<c045b7e5>] filemap_fdatawrite+0x12/0x16 
 [<f8d20da1>] nfs_file_flush+0x66/0x78 [nfs] 
 [<c0476860>] filp_close+0x2f/0x54 
 [<c0477ad8>] sys_close+0x71/0xa0 
 [<c0404f4b>] syscall_call+0x7/0xb 
 ======================= 
Code: 0f ba 33 06 ff 8e 9c 11 00 00 eb 06 ff 8e a0 11 00 00 8d 86 80 11 00 00 89 fa e8 6b 58 1c 00 89 d8 5b 5e 5f e9 e1 d9 ff ff 89 c2 <8b> 00 f6 c4 40 74 07 89 d0 e9 47 fa ff ff 8b 42 04 85 c0 75 0a  
EIP: [<c04611d9>] put_page+0x2/0x34 SS:ESP 0068:f09f8bdc 
 <0>Kernel panic - not syncing: Fatal exception 


Version-Release number of selected component (if applicable):
RHEL5.9-Server-20120729.1 i386
kernel-2.6.18-333.el5

How reproducible:
1/1

Steps to Reproduce:
1./kernel/filesystems/nfs/sanity_check
2.
3.
  
Actual results:
kernel panic

Expected results:
no kernel panic


Additional info:

Comment 2 RHEL Program Management 2012-10-30 06:12:53 UTC
This request was not resolved in time for the current release.
Red Hat invites you to ask your support representative to
propose this request, if still desired, for consideration in
the next release of Red Hat Enterprise Linux.

Comment 4 RHEL Program Management 2014-03-07 12:42:51 UTC
This bug/component is not included in scope for RHEL-5.11.0 which is the last RHEL5 minor release. This Bugzilla will soon be CLOSED as WONTFIX (at the end of RHEL5.11 development phase (Apr 22, 2014)). Please contact your account manager or support representative in case you need to escalate this bug.

Comment 5 RHEL Program Management 2014-06-02 13:06:31 UTC
Thank you for submitting this request for inclusion in Red Hat Enterprise Linux 5. We've carefully evaluated the request, but are unable to include it in RHEL5 stream. If the issue is critical for your business, please provide additional business justification through the appropriate support channels (https://access.redhat.com/site/support).

Comment 6 Red Hat Bugzilla 2023-09-14 01:36:36 UTC
The needinfo request[s] on this closed bug have been removed as they have been unresolved for 1000 days


Note You need to log in before you can comment on or make changes to this bug.