Comment 5 for bug 328440

Revision history for this message
Matt Zimmerman (mdz) wrote :

I just saw this happen again. I had (apparently successfully) resumed from S3 and was starting to work in my session (I started a download of updates) when I noticed that mutt segfaulted. dmesg showed a series of oopses starting with the one below. Only this one was successfully logged, and the system quickly became unusable and had to be power cycled.

Feb 18 09:26:32 perseus kernel: [86097.605776] general protection fault: 0000 [#1] SMP
Feb 18 09:26:32 perseus kernel: [86097.605789] last sysfs file: /sys/devices/system/cpu/cpu0/cpufreq/scaling_cur_freq
Feb 18 09:26:32 perseus kernel: [86097.605795] Dumping ftrace buffer:
Feb 18 09:26:32 perseus kernel: [86097.605801] (ftrace buffer empty)
Feb 18 09:26:32 perseus kernel: [86097.605804] CPU 1
Feb 18 09:26:32 perseus kernel: [86097.605809] Modules linked in: i915 drm bridge stp bnep kvm_intel kvm tun acpi_cpufreq input_polldev sbp2 ppdev parport_pc lp parport joydev snd_hda_intel arc4 snd_pcm_oss ecb snd_mixer_oss snd_pcm snd_seq_dummy snd_seq_oss iwlagn snd_seq_midi pcmcia lirc_atiusb snd_rawmidi snd_seq_midi_event snd_seq thinkpad_acpi snd_timer iwlcore lirc_dev snd_seq_device led_class mac80211 nvram video psmouse yenta_socket rsrc_nonstatic pcmcia_core ricoh_mmc sdhci_pci sdhci output iTCO_wdt snd soundcore serio_raw intel_agp iTCO_vendor_support snd_page_alloc ati_remote pcspkr cfg80211 ohci1394 ieee1394 ehci_hcd uhci_hcd e1000e fbcon tileblit font bitblit softcursor fuse
Feb 18 09:26:32 perseus kernel: [86097.605922] Pid: 26970, comm: mutt Not tainted 2.6.28-7-generic #20-Ubuntu
Feb 18 09:26:32 perseus kernel: [86097.605927] RIP: 0010:[<ffffffff8031254d>] [<ffffffff8031254d>] do_mpage_readpage+0x3d/0x5e0
Feb 18 09:26:32 perseus kernel: [86097.605944] RSP: 0018:ffff88000f299b48 EFLAGS: 00010296
Feb 18 09:26:32 perseus kernel: [86097.605948] RAX: 03e9c04008000008 RBX: ffffe200015b0228 RCX: ffff88000f299ca0
Feb 18 09:26:32 perseus kernel: [86097.605953] RDX: 0000000000000001 RSI: ffffe200015b0228 RDI: 0000000000000000
Feb 18 09:26:32 perseus kernel: [86097.605958] RBP: ffff88000f299c08 R08: ffff88000f299c28 R09: ffff88000f299c98
Feb 18 09:26:32 perseus kernel: [86097.605963] R10: ffffe200015b0228 R11: 0000000000000001 R12: ffff88006690a2d8
Feb 18 09:26:32 perseus kernel: [86097.605968] R13: ffff88000f299c28 R14: 0000000000000002 R15: 0000000000000005
Feb 18 09:26:32 perseus kernel: [86097.605974] FS: 00007fc3099b4710(0000) GS:ffff8800be003c80(0000) knlGS:0000000000000000
Feb 18 09:26:32 perseus kernel: [86097.605979] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Feb 18 09:26:32 perseus kernel: [86097.605984] CR2: 00000000026ea000 CR3: 00000000501f0000 CR4: 00000000000026a0
Feb 18 09:26:32 perseus kernel: [86097.605989] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
Feb 18 09:26:32 perseus kernel: [86097.605994] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Feb 18 09:26:32 perseus kernel: [86097.606000] Process mutt (pid: 26970, threadinfo ffff88000f298000, task ffff88007ad5acc0)
Feb 18 09:26:32 perseus kernel: [86097.606004] Stack:
Feb 18 09:26:32 perseus kernel: [86097.606008] ffff88000f299c98 ffff88000f299ca0 000000018023b06f ffffe200015b0228
Feb 18 09:26:32 perseus kernel: [86097.606017] 0000000000000000 ffff88000103b8f0 0000000000000001 ffff8800bb1b2490
Feb 18 09:26:32 perseus kernel: [86097.606027] ffff88000f299bb8 ffffffff8023dcab ffff88000103b8f0 0000000000000000
Feb 18 09:26:32 perseus kernel: [86097.606038] Call Trace:
Feb 18 09:26:32 perseus kernel: [86097.606042] [<ffffffff8023dcab>] ? dequeue_entity+0x1b/0x250
Feb 18 09:26:32 perseus kernel: [86097.606053] [<ffffffff802106c5>] ? __switch_to+0x2a5/0x490
Feb 18 09:26:32 perseus kernel: [86097.606064] [<ffffffff80312b2f>] mpage_readpage+0x3f/0x60
Feb 18 09:26:32 perseus kernel: [86097.606071] [<ffffffff8034e8e0>] ? ext3_get_block+0x0/0x130
Feb 18 09:26:32 perseus kernel: [86097.606080] [<ffffffff80681939>] ? _spin_lock+0x9/0x10
Feb 18 09:26:32 perseus kernel: [86097.606092] [<ffffffff80681939>] ? _spin_lock+0x9/0x10
Feb 18 09:26:32 perseus kernel: [86097.606099] [<ffffffff802fe759>] ? mnt_drop_write+0x79/0x1b0
Feb 18 09:26:32 perseus kernel: [86097.606108] [<ffffffff802ad507>] ? file_read_actor+0x157/0x180
Feb 18 09:26:32 perseus kernel: [86097.606118] [<ffffffff8034c063>] ext3_readpage+0x13/0x20
Feb 18 09:26:32 perseus kernel: [86097.606126] [<ffffffff802aefaf>] do_generic_file_read+0x1af/0x4a0
Feb 18 09:26:32 perseus kernel: [86097.606134] [<ffffffff802ad3b0>] ? file_read_actor+0x0/0x180
Feb 18 09:26:32 perseus kernel: [86097.606142] [<ffffffff802af369>] generic_file_aio_read+0xc9/0x1e0
Feb 18 09:26:32 perseus kernel: [86097.606150] [<ffffffff802e4671>] do_sync_read+0xf1/0x140
Feb 18 09:26:32 perseus kernel: [86097.606159] [<ffffffff802658d0>] ? autoremove_wake_function+0x0/0x40
Feb 18 09:26:32 perseus kernel: [86097.606170] [<ffffffff8031bcfe>] ? locks_free_lock+0x3e/0x60
Feb 18 09:26:32 perseus kernel: [86097.606179] [<ffffffff803e9123>] ? apparmor_file_permission+0x23/0x30
Feb 18 09:26:32 perseus kernel: [86097.606190] [<ffffffff803c3961>] ? security_file_permission+0x11/0x20
Feb 18 09:26:32 perseus kernel: [86097.606201] [<ffffffff802e4e58>] vfs_read+0xc8/0x130
Feb 18 09:26:32 perseus kernel: [86097.606209] [<ffffffff802e4fb0>] sys_read+0x50/0x90
Feb 18 09:26:32 perseus kernel: [86097.606216] [<ffffffff8021253a>] system_call_fastpath+0x16/0x1b
Feb 18 09:26:32 perseus kernel: [86097.606224] Code: ec 98 00 00 00 48 89 bd 60 ff ff ff 48 89 b5 58 ff ff ff 89 95 54 ff ff ff 48 89 8d 48 ff ff ff 4c 89 8d 40 ff ff ff 48 8b 46 18 <48> 8b 00 48 89 85 68 ff ff ff 8b 80 a0 00 00 00 89 85 74 ff ff
Feb 18 09:26:32 perseus kernel: [86097.606304] RIP [<ffffffff8031254d>] do_mpage_readpage+0x3d/0x5e0
Feb 18 09:26:32 perseus kernel: [86097.606311] RSP <ffff88000f299b48>
Feb 18 09:26:32 perseus kernel: [86097.606317] ---[ end trace 01af541dd149b47c ]---