[Kernel-packages] [Bug 1908912] Re: "BUG: unable to handle page fault for address" 5.4.0-58-generic #64~18.04.1-Ubuntu

2021-10-29 Thread DiagonalArg
I'm on 20.04.3, kernel 5.4.0-89, with a similar problem:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1949247

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1908912

Title:
  "BUG: unable to handle page fault for address" 5.4.0-58-generic
  #64~18.04.1-Ubuntu

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  mezimm00@m5:~$ lsb_release -rd
  Description:Ubuntu 18.04.5 LTS
  Release:18.04

  mezimm00@m5:~$ apt-cache policy linux-image-5.4.0-58-generic
  linux-image-5.4.0-58-generic:
Installed: 5.4.0-58.64~18.04.1
Candidate: 5.4.0-58.64~18.04.1
Version table:
   *** 5.4.0-58.64~18.04.1 500
  500 http://us.archive.ubuntu.com/ubuntu bionic-updates/main amd64 
Packages
  500 http://us.archive.ubuntu.com/ubuntu bionic-security/main amd64 
Packages
  100 /var/lib/dpkg/status

  Dec 20 08:59:56 m5 kernel: [144210.719252] BUG: unable to handle page fault 
for address: 0007fb39be0e
  Dec 20 08:59:56 m5 kernel: [144210.719320] #PF: supervisor read access in 
kernel mode
  Dec 20 08:59:56 m5 kernel: [144210.719358] #PF: error_code(0x) - 
not-present page
  Dec 20 08:59:56 m5 kernel: [144210.719395] PGD 0 P4D 0
  Dec 20 08:59:56 m5 kernel: [144210.719420] Oops:  [#1] SMP PTI
  Dec 20 08:59:56 m5 kernel: [144210.719449] CPU: 139 PID: 3081629 Comm: lsof 
Not tainted 5.4.0-58-generic #64~18.04.1-Ubuntu
  Dec 20 08:59:56 m5 kernel: [144210.719505] Hardware name: Dell Inc. PowerEdge 
R930/0T55KM, BIOS 2.8.1 01/02/2020
  Dec 20 08:59:56 m5 kernel: [144210.719563] RIP: 
0010:lock_get_status+0x221/0x380
  Dec 20 08:59:56 m5 kernel: [144210.719600] Code: fd 7b de 91 4c 89 e7 e8 fd 
30 fb ff 4d 85 ed 0f 84 de 00 00 00 49 8b 45 28 4d 8b 4d 40 44 89 f2 48 c7 c6 
91 52 d7 91 4c 89 e7 <44> 8b 40 10 44 89 c1 41 81 e0 ff ff 0f 00 c1 e9 14 e8 c9 
30 fb ff
  Dec 20 08:59:56 m5 kernel: [144210.719717] RSP: 0018:b731373efd98 EFLAGS: 
00010286
  Dec 20 08:59:56 m5 kernel: [144210.719755] RAX: 0007fb39bdfe RBX: 
939c33a080d8 RCX: 0001
  Dec 20 08:59:56 m5 kernel: [144210.719803] RDX: 0003b0a9 RSI: 
91d75291 RDI: 938e2d796800
  Dec 20 08:59:56 m5 kernel: [144210.719851] RBP: b731373efdc8 R08: 
1000 R09: 93565c5a23b8
  Dec 20 08:59:56 m5 kernel: [144210.719899] R10: b731373efe50 R11: 
9394905b51d5 R12: 938e2d796800
  Dec 20 08:59:56 m5 kernel: [144210.719948] R13: 934002945d90 R14: 
0003b0a9 R15: 9390ce8a38a0
  Dec 20 08:59:56 m5 kernel: [144210.719997] FS:  7ff9bcbb4040() 
GS:939c3fa8() knlGS:
  Dec 20 08:59:56 m5 kernel: [144210.720050] CS:  0010 DS:  ES:  CR0: 
80050033
  Dec 20 08:59:56 m5 kernel: [144210.720090] CR2: 0007fb39be0e CR3: 
00e75d31a002 CR4: 001606e0
  Dec 20 08:59:56 m5 kernel: [144210.720138] DR0:  DR1: 
 DR2: 
  Dec 20 08:59:56 m5 kernel: [144210.720186] DR3:  DR6: 
fffe0ff0 DR7: 0400
  Dec 20 08:59:56 m5 kernel: [144210.720233] Call Trace:
  Dec 20 08:59:56 m5 kernel: [144210.720262]  locks_show+0x83/0xc0
  Dec 20 08:59:56 m5 kernel: [144210.720297]  seq_read+0x2a4/0x420
  Dec 20 08:59:56 m5 kernel: [144210.720330]  proc_reg_read+0x3e/0x60
  Dec 20 08:59:56 m5 kernel: [144210.720361]  __vfs_read+0x1b/0x40
  Dec 20 08:59:56 m5 kernel: [144210.721947]  vfs_read+0x8e/0x130
  Dec 20 08:59:56 m5 kernel: [144210.723479]  ksys_read+0xa7/0xe0
  Dec 20 08:59:56 m5 kernel: [144210.725009]  __x64_sys_read+0x1a/0x20
  Dec 20 08:59:56 m5 kernel: [144210.726545]  do_syscall_64+0x57/0x190
  Dec 20 08:59:56 m5 kernel: [144210.728064]  
entry_SYSCALL_64_after_hwframe+0x44/0xa9
  Dec 20 08:59:56 m5 kernel: [144210.729580] RIP: 0033:0x7ff9bc48e151
  Dec 20 08:59:56 m5 kernel: [144210.731081] Code: fe ff ff 48 8d 3d 3f 9b 0a 
00 48 83 ec 08 e8 66 4a 02 00 66 0f 1f 44 00 00 48 8d 05 91 08 2e 00 8b 00 85 
c0 75 13 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 57 f3 c3 0f 1f 44 00 00 41 54 55 49 
89 d4 53
  Dec 20 08:59:56 m5 kernel: [144210.734225] RSP: 002b:7ffc9e915348 EFLAGS: 
0246 ORIG_RAX: 
  Dec 20 08:59:56 m5 kernel: [144210.735809] RAX: ffda RBX: 
55f16fee7260 RCX: 7ff9bc48e151
  Dec 20 08:59:56 m5 kernel: [144210.737396] RDX: 1000 RSI: 
55f16fee8d80 RDI: 0003
  Dec 20 08:59:56 m5 kernel: [144210.738947] RBP: 0d68 R08: 
0001 R09: 55f16fee7340
  Dec 20 08:59:56 m5 kernel: [144210.740456] R10: 7ff9bcbb4040 R11: 
0246 R12: 7ff9bc765760
  Dec 20 08:59:56 m5 kernel: [144210.741923] R13: 7ff9bc7662a0 R14: 
55f16fee7260 R15: 0fff
  Dec 20 08:59:56 m5 kernel: [144210.743353] Modules linked in: ip6table_filter 
ip6_tables tcp_diag udp_diag inet_diag xt_REDIRECT ip_vs_rr xt_ipvs ip_vs 

[Kernel-packages] [Bug 1908912] Re: "BUG: unable to handle page fault for address" 5.4.0-58-generic #64~18.04.1-Ubuntu

2020-12-21 Thread Matthew Zimmerman
apport information

** Tags added: apport-collected uec-images

** Description changed:

  mezimm00@m5:~$ lsb_release -rd
  Description:Ubuntu 18.04.5 LTS
  Release:18.04
  
  mezimm00@m5:~$ apt-cache policy linux-image-5.4.0-58-generic
  linux-image-5.4.0-58-generic:
Installed: 5.4.0-58.64~18.04.1
Candidate: 5.4.0-58.64~18.04.1
Version table:
   *** 5.4.0-58.64~18.04.1 500
  500 http://us.archive.ubuntu.com/ubuntu bionic-updates/main amd64 
Packages
  500 http://us.archive.ubuntu.com/ubuntu bionic-security/main amd64 
Packages
  100 /var/lib/dpkg/status
  
  Dec 20 08:59:56 m5 kernel: [144210.719252] BUG: unable to handle page fault 
for address: 0007fb39be0e
  Dec 20 08:59:56 m5 kernel: [144210.719320] #PF: supervisor read access in 
kernel mode
  Dec 20 08:59:56 m5 kernel: [144210.719358] #PF: error_code(0x) - 
not-present page
  Dec 20 08:59:56 m5 kernel: [144210.719395] PGD 0 P4D 0
  Dec 20 08:59:56 m5 kernel: [144210.719420] Oops:  [#1] SMP PTI
  Dec 20 08:59:56 m5 kernel: [144210.719449] CPU: 139 PID: 3081629 Comm: lsof 
Not tainted 5.4.0-58-generic #64~18.04.1-Ubuntu
  Dec 20 08:59:56 m5 kernel: [144210.719505] Hardware name: Dell Inc. PowerEdge 
R930/0T55KM, BIOS 2.8.1 01/02/2020
  Dec 20 08:59:56 m5 kernel: [144210.719563] RIP: 
0010:lock_get_status+0x221/0x380
  Dec 20 08:59:56 m5 kernel: [144210.719600] Code: fd 7b de 91 4c 89 e7 e8 fd 
30 fb ff 4d 85 ed 0f 84 de 00 00 00 49 8b 45 28 4d 8b 4d 40 44 89 f2 48 c7 c6 
91 52 d7 91 4c 89 e7 <44> 8b 40 10 44 89 c1 41 81 e0 ff ff 0f 00 c1 e9 14 e8 c9 
30 fb ff
  Dec 20 08:59:56 m5 kernel: [144210.719717] RSP: 0018:b731373efd98 EFLAGS: 
00010286
  Dec 20 08:59:56 m5 kernel: [144210.719755] RAX: 0007fb39bdfe RBX: 
939c33a080d8 RCX: 0001
  Dec 20 08:59:56 m5 kernel: [144210.719803] RDX: 0003b0a9 RSI: 
91d75291 RDI: 938e2d796800
  Dec 20 08:59:56 m5 kernel: [144210.719851] RBP: b731373efdc8 R08: 
1000 R09: 93565c5a23b8
  Dec 20 08:59:56 m5 kernel: [144210.719899] R10: b731373efe50 R11: 
9394905b51d5 R12: 938e2d796800
  Dec 20 08:59:56 m5 kernel: [144210.719948] R13: 934002945d90 R14: 
0003b0a9 R15: 9390ce8a38a0
  Dec 20 08:59:56 m5 kernel: [144210.719997] FS:  7ff9bcbb4040() 
GS:939c3fa8() knlGS:
  Dec 20 08:59:56 m5 kernel: [144210.720050] CS:  0010 DS:  ES:  CR0: 
80050033
  Dec 20 08:59:56 m5 kernel: [144210.720090] CR2: 0007fb39be0e CR3: 
00e75d31a002 CR4: 001606e0
  Dec 20 08:59:56 m5 kernel: [144210.720138] DR0:  DR1: 
 DR2: 
  Dec 20 08:59:56 m5 kernel: [144210.720186] DR3:  DR6: 
fffe0ff0 DR7: 0400
  Dec 20 08:59:56 m5 kernel: [144210.720233] Call Trace:
  Dec 20 08:59:56 m5 kernel: [144210.720262]  locks_show+0x83/0xc0
  Dec 20 08:59:56 m5 kernel: [144210.720297]  seq_read+0x2a4/0x420
  Dec 20 08:59:56 m5 kernel: [144210.720330]  proc_reg_read+0x3e/0x60
  Dec 20 08:59:56 m5 kernel: [144210.720361]  __vfs_read+0x1b/0x40
  Dec 20 08:59:56 m5 kernel: [144210.721947]  vfs_read+0x8e/0x130
  Dec 20 08:59:56 m5 kernel: [144210.723479]  ksys_read+0xa7/0xe0
  Dec 20 08:59:56 m5 kernel: [144210.725009]  __x64_sys_read+0x1a/0x20
  Dec 20 08:59:56 m5 kernel: [144210.726545]  do_syscall_64+0x57/0x190
  Dec 20 08:59:56 m5 kernel: [144210.728064]  
entry_SYSCALL_64_after_hwframe+0x44/0xa9
  Dec 20 08:59:56 m5 kernel: [144210.729580] RIP: 0033:0x7ff9bc48e151
  Dec 20 08:59:56 m5 kernel: [144210.731081] Code: fe ff ff 48 8d 3d 3f 9b 0a 
00 48 83 ec 08 e8 66 4a 02 00 66 0f 1f 44 00 00 48 8d 05 91 08 2e 00 8b 00 85 
c0 75 13 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 57 f3 c3 0f 1f 44 00 00 41 54 55 49 
89 d4 53
  Dec 20 08:59:56 m5 kernel: [144210.734225] RSP: 002b:7ffc9e915348 EFLAGS: 
0246 ORIG_RAX: 
  Dec 20 08:59:56 m5 kernel: [144210.735809] RAX: ffda RBX: 
55f16fee7260 RCX: 7ff9bc48e151
  Dec 20 08:59:56 m5 kernel: [144210.737396] RDX: 1000 RSI: 
55f16fee8d80 RDI: 0003
  Dec 20 08:59:56 m5 kernel: [144210.738947] RBP: 0d68 R08: 
0001 R09: 55f16fee7340
  Dec 20 08:59:56 m5 kernel: [144210.740456] R10: 7ff9bcbb4040 R11: 
0246 R12: 7ff9bc765760
  Dec 20 08:59:56 m5 kernel: [144210.741923] R13: 7ff9bc7662a0 R14: 
55f16fee7260 R15: 0fff
  Dec 20 08:59:56 m5 kernel: [144210.743353] Modules linked in: ip6table_filter 
ip6_tables tcp_diag udp_diag inet_diag xt_REDIRECT ip_vs_rr xt_ipvs ip_vs 
xt_nat xt_tcpudp veth vxlan ip6_udp_tunnel udp_tunnel iptable_mangle xt_mark 
xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xt_addrtype 
iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 
bpfilter br_netfilter bridge stp llc rpcsec_gss_krb5 auth_rpcgss aufs nfsv4 
ceph libceph nfs lockd grace fscache 

[Kernel-packages] [Bug 1908912] Re: "BUG: unable to handle page fault for address" 5.4.0-58-generic #64~18.04.1-Ubuntu

2020-12-21 Thread Matthew Zimmerman
After this occurs, I can't execute any new processes, but current
processes continue to work. So if I have a shell session up already, it
will continue, however any command I run hangs indefinitely.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1908912

Title:
  "BUG: unable to handle page fault for address" 5.4.0-58-generic
  #64~18.04.1-Ubuntu

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  mezimm00@m5:~$ lsb_release -rd
  Description:Ubuntu 18.04.5 LTS
  Release:18.04

  mezimm00@m5:~$ apt-cache policy linux-image-5.4.0-58-generic
  linux-image-5.4.0-58-generic:
Installed: 5.4.0-58.64~18.04.1
Candidate: 5.4.0-58.64~18.04.1
Version table:
   *** 5.4.0-58.64~18.04.1 500
  500 http://us.archive.ubuntu.com/ubuntu bionic-updates/main amd64 
Packages
  500 http://us.archive.ubuntu.com/ubuntu bionic-security/main amd64 
Packages
  100 /var/lib/dpkg/status

  Dec 20 08:59:56 m5 kernel: [144210.719252] BUG: unable to handle page fault 
for address: 0007fb39be0e
  Dec 20 08:59:56 m5 kernel: [144210.719320] #PF: supervisor read access in 
kernel mode
  Dec 20 08:59:56 m5 kernel: [144210.719358] #PF: error_code(0x) - 
not-present page
  Dec 20 08:59:56 m5 kernel: [144210.719395] PGD 0 P4D 0
  Dec 20 08:59:56 m5 kernel: [144210.719420] Oops:  [#1] SMP PTI
  Dec 20 08:59:56 m5 kernel: [144210.719449] CPU: 139 PID: 3081629 Comm: lsof 
Not tainted 5.4.0-58-generic #64~18.04.1-Ubuntu
  Dec 20 08:59:56 m5 kernel: [144210.719505] Hardware name: Dell Inc. PowerEdge 
R930/0T55KM, BIOS 2.8.1 01/02/2020
  Dec 20 08:59:56 m5 kernel: [144210.719563] RIP: 
0010:lock_get_status+0x221/0x380
  Dec 20 08:59:56 m5 kernel: [144210.719600] Code: fd 7b de 91 4c 89 e7 e8 fd 
30 fb ff 4d 85 ed 0f 84 de 00 00 00 49 8b 45 28 4d 8b 4d 40 44 89 f2 48 c7 c6 
91 52 d7 91 4c 89 e7 <44> 8b 40 10 44 89 c1 41 81 e0 ff ff 0f 00 c1 e9 14 e8 c9 
30 fb ff
  Dec 20 08:59:56 m5 kernel: [144210.719717] RSP: 0018:b731373efd98 EFLAGS: 
00010286
  Dec 20 08:59:56 m5 kernel: [144210.719755] RAX: 0007fb39bdfe RBX: 
939c33a080d8 RCX: 0001
  Dec 20 08:59:56 m5 kernel: [144210.719803] RDX: 0003b0a9 RSI: 
91d75291 RDI: 938e2d796800
  Dec 20 08:59:56 m5 kernel: [144210.719851] RBP: b731373efdc8 R08: 
1000 R09: 93565c5a23b8
  Dec 20 08:59:56 m5 kernel: [144210.719899] R10: b731373efe50 R11: 
9394905b51d5 R12: 938e2d796800
  Dec 20 08:59:56 m5 kernel: [144210.719948] R13: 934002945d90 R14: 
0003b0a9 R15: 9390ce8a38a0
  Dec 20 08:59:56 m5 kernel: [144210.719997] FS:  7ff9bcbb4040() 
GS:939c3fa8() knlGS:
  Dec 20 08:59:56 m5 kernel: [144210.720050] CS:  0010 DS:  ES:  CR0: 
80050033
  Dec 20 08:59:56 m5 kernel: [144210.720090] CR2: 0007fb39be0e CR3: 
00e75d31a002 CR4: 001606e0
  Dec 20 08:59:56 m5 kernel: [144210.720138] DR0:  DR1: 
 DR2: 
  Dec 20 08:59:56 m5 kernel: [144210.720186] DR3:  DR6: 
fffe0ff0 DR7: 0400
  Dec 20 08:59:56 m5 kernel: [144210.720233] Call Trace:
  Dec 20 08:59:56 m5 kernel: [144210.720262]  locks_show+0x83/0xc0
  Dec 20 08:59:56 m5 kernel: [144210.720297]  seq_read+0x2a4/0x420
  Dec 20 08:59:56 m5 kernel: [144210.720330]  proc_reg_read+0x3e/0x60
  Dec 20 08:59:56 m5 kernel: [144210.720361]  __vfs_read+0x1b/0x40
  Dec 20 08:59:56 m5 kernel: [144210.721947]  vfs_read+0x8e/0x130
  Dec 20 08:59:56 m5 kernel: [144210.723479]  ksys_read+0xa7/0xe0
  Dec 20 08:59:56 m5 kernel: [144210.725009]  __x64_sys_read+0x1a/0x20
  Dec 20 08:59:56 m5 kernel: [144210.726545]  do_syscall_64+0x57/0x190
  Dec 20 08:59:56 m5 kernel: [144210.728064]  
entry_SYSCALL_64_after_hwframe+0x44/0xa9
  Dec 20 08:59:56 m5 kernel: [144210.729580] RIP: 0033:0x7ff9bc48e151
  Dec 20 08:59:56 m5 kernel: [144210.731081] Code: fe ff ff 48 8d 3d 3f 9b 0a 
00 48 83 ec 08 e8 66 4a 02 00 66 0f 1f 44 00 00 48 8d 05 91 08 2e 00 8b 00 85 
c0 75 13 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 57 f3 c3 0f 1f 44 00 00 41 54 55 49 
89 d4 53
  Dec 20 08:59:56 m5 kernel: [144210.734225] RSP: 002b:7ffc9e915348 EFLAGS: 
0246 ORIG_RAX: 
  Dec 20 08:59:56 m5 kernel: [144210.735809] RAX: ffda RBX: 
55f16fee7260 RCX: 7ff9bc48e151
  Dec 20 08:59:56 m5 kernel: [144210.737396] RDX: 1000 RSI: 
55f16fee8d80 RDI: 0003
  Dec 20 08:59:56 m5 kernel: [144210.738947] RBP: 0d68 R08: 
0001 R09: 55f16fee7340
  Dec 20 08:59:56 m5 kernel: [144210.740456] R10: 7ff9bcbb4040 R11: 
0246 R12: 7ff9bc765760
  Dec 20 08:59:56 m5 kernel: [144210.741923] R13: 7ff9bc7662a0 R14: 
55f16fee7260 R15: 0fff
  Dec 20 08:59:56 m5 kernel: [144210.743353] Modules linked in: