"kernel BUG at /build/linux-lts-wily-Vv6Eyd/linux-lts-wily-4.2.0/mm/memory.c:3146!"
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Fix Released
|
Medium
|
Unassigned | ||
Trusty |
Invalid
|
Undecided
|
Unassigned | ||
Wily |
Confirmed
|
Medium
|
Unassigned | ||
linux-lts-wily (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Trusty |
Confirmed
|
Medium
|
Unassigned | ||
Wily |
Invalid
|
Undecided
|
Unassigned |
Bug Description
I was trying to attach gdb to chromium-browser, by passing the PID to gdb (gdb -p $PID). The first attempt as non-root user crashed gdb and I got this message:
------------[ cut here ]------------
kernel BUG at /build/
invalid opcode: 0000 [#1] SMP
Modules linked in: vboxpci(OE) vboxnetadp(OE) r8168(OE) vboxnetflt(OE) vboxdrv(OE) ib_cm ib_sa ib_mad ib_core ib_addr libfc qla2xxx scsi_transport_fc configfs pci_stub drbg ansi_cprng ctr ccm dm_crypt ip6table_filter ip6_tables iptable_filter ip_tables x_tables binfmt_misc uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_core v4l2_common videodev media arc4 hp_wmi sparse_keymap rtsx_pci_ms memstick dm_multipath scsi_dh snd_hda_codec_idt ath9k snd_hda_
CPU: 3 PID: 25702 Comm: gdb Tainted: G OE 4.2.0-27-generic #32~14.04.1-Ubuntu
Hardware name: Hewlett-Packard HP Pavilion dv6 Notebook PC/3590, BIOS F.21 09/13/2011
task: ffff8800cb54d780 ti: ffff88000a8f0000 task.ti: ffff88000a8f0000
RIP: 0010:[<
RSP: 0018:ffff88000a
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00003ffffffff000
RDX: ffff8801697c04f8 RSI: 0000000000000120 RDI: 00000001697c0067
RBP: ffff88000a8f3c78 R08: 00000001edddb120 R09: 0000000000000120
R10: 0000000000000001 R11: ffff8800000004f8 R12: ffff88003265bc00
R13: ffff880007a18808 R14: 00007f856029fe68 R15: ffff8800aa3843c0
FS: 00007f3d9533474
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000002b69528 CR3: 000000012a9ad000 CR4: 00000000000006e0
Stack:
0000001600000000 ffff880000000016 ffffea0005a5f030 ffffffff817b0e73
ffff88003265bc00 00007f856029fe68 0000001700000000 ffff8800000004f8
ffff880000000000 0000000000000017 00007f856029fe68 ffff88003265bc00
Call Trace:
[<ffffffff817b
[<ffffffff811a
[<ffffffff811a
[<ffffffff811a
[<ffffffff811a
[<ffffffff811a
[<ffffffff8108
[<ffffffff817a
[<ffffffff810a
[<ffffffff811e
[<ffffffff8102
[<ffffffff8108
[<ffffffff8108
[<ffffffff817b
Code: d8 50 a8 81 e8 92 0f ed ff 4c 8b 9d 78 ff ff ff e9 fa ee ff ff 48 8b 7d 98 89 45 80 e8 2a dd fd ff 8b 45 80 89 c3 e9 ba eb ff ff <0f> 0b c7 45 80 01 00 00 00 e9 a5 f7 ff ff 4c 89 c7 48 89 95 68
RIP [<ffffffff811a6
RSP <ffff88000a8f3bb8>
---[ end trace c5ec208e5d4b9c66 ]---
Then I tried running it as root (sudo gdb -p $PID). gdb got stuck at "Attaching to process ...". I tried killing gdb as root from another terminal, by running "killall gdb", but killall got stuck, too. pidof and ps also got stuck...
This is the line referenced in the error message: http://
There is a similar bug report here: https:/
Should I report this bug upstream?
My system is:
$ lsb_release -a
LSB Version: core-2.
Distributor ID: Ubuntu
Description: Ubuntu 14.04.3 LTS
Release: 14.04
Codename: trusty
$ uname -r
4.2.0-27-generic
$ dpkg -l | grep linux-image-generic
ii linux-image-
---
ApportVersion: 2.14.1-0ubuntu3.19
Architecture: amd64
AudioDevicesInUse:
USER PID ACCESS COMMAND
/dev/snd/
/dev/snd/
CurrentDesktop: KDE
DistroRelease: Ubuntu 14.04
EcryptfsInUse: Yes
MachineType: Hewlett-Packard HP Pavilion dv6 Notebook PC
Package: linux (not installed)
ProcFB:
0 radeondrmfb
1 radeondrmfb
ProcKernelCmdLine: BOOT_IMAGE=
ProcVersionSign
RelatedPackageV
linux-
linux-
linux-firmware 1.134~gd~t
Tags: trusty trusty
Uname: Linux 4.2.0-34-generic x86_64
UpgradeStatus: Upgraded to trusty on 2014-06-06 (648 days ago)
UserGroups: adm admin audio cdrom debian-tor dialout disk fuse kismet libvirtd lpadmin lxd messagebus netdev plugdev sambashare uml-net uucp vboxusers video wireshark
_MarkForUpload: True
dmi.bios.date: 09/13/2011
dmi.bios.vendor: Hewlett-Packard
dmi.bios.version: F.21
dmi.board.
dmi.board.name: 3590
dmi.board.vendor: Hewlett-Packard
dmi.board.version: 33.18
dmi.chassis.
dmi.chassis.type: 10
dmi.chassis.vendor: Hewlett-Packard
dmi.chassis.
dmi.modalias: dmi:bvnHewlett-
dmi.product.name: HP Pavilion dv6 Notebook PC
dmi.product.
dmi.sys.vendor: Hewlett-Packard
description: | updated |
description: | updated |
summary: |
"kernel BUG at /build/linux-lts-wily-Vv6Eyd/linux-lts- - wily-4.2.0/mm/memory.c:3146!" when starting gdb as root, gdb freezes + wily-4.2.0/mm/memory.c:3146!" |
information type: | Public → Public Security |
Changed in linux-lts-wily (Ubuntu): | |
status: | Confirmed → Invalid |
Changed in linux (Ubuntu Trusty): | |
status: | New → Invalid |
Changed in linux-lts-wily (Ubuntu Wily): | |
status: | New → Invalid |
Changed in linux (Ubuntu): | |
importance: | Undecided → Medium |
Changed in linux (Ubuntu Wily): | |
importance: | Undecided → Medium |
Changed in linux-lts-wily (Ubuntu Trusty): | |
importance: | Undecided → Medium |
status: | New → Incomplete |
tags: | added: latest-bios-f.21 |
tags: | added: needs-reverse-bisect |
Changed in linux (Ubuntu Wily): | |
status: | Incomplete → Confirmed |
3133 static int do_numa_page(struct mm_struct *mm, struct vm_area_struct *vma, !(vma-> vm_flags & (VM_READ | VM_EXEC | VM_WRITE)));
3134 unsigned long addr, pte_t pte, pte_t *ptep, pmd_t *pmd)
3135 {
/* ... */
3144
3145 /* A PROT_NONE fault should not end up here */
3146 BUG_ON(
3147
3235 static int handle_ pte_fault( struct mm_struct *mm, entry))
3236 struct vm_area_struct *vma, unsigned long address,
3237 pte_t *pte, pmd_t *pmd, unsigned int flags)
3238 {
/* ... */
3265 if (pte_protnone(
3266 return do_numa_page(mm, vma, address, entry, pte, pmd);
3267
handle_pte_fault() appears to ensure that it calls do_numa_page() only on the exact condition do_numa_page() considers a bug.
http:// lxr.free- electrons. com/source/ mm/memory. c?v=4.2# L3146 lxr.free- electrons. com/source/ mm/memory. c?v=4.2# L3266
http://