[Kernel-packages] [Bug 1908912] Re: "BUG: unable to handle page fault for address" 5.4.0-58-generic #64~18.04.1-Ubuntu
I'm on 20.04.3, kernel 5.4.0-89, with a similar problem: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1949247 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1908912 Title: "BUG: unable to handle page fault for address" 5.4.0-58-generic #64~18.04.1-Ubuntu Status in linux package in Ubuntu: Confirmed Bug description: mezimm00@m5:~$ lsb_release -rd Description:Ubuntu 18.04.5 LTS Release:18.04 mezimm00@m5:~$ apt-cache policy linux-image-5.4.0-58-generic linux-image-5.4.0-58-generic: Installed: 5.4.0-58.64~18.04.1 Candidate: 5.4.0-58.64~18.04.1 Version table: *** 5.4.0-58.64~18.04.1 500 500 http://us.archive.ubuntu.com/ubuntu bionic-updates/main amd64 Packages 500 http://us.archive.ubuntu.com/ubuntu bionic-security/main amd64 Packages 100 /var/lib/dpkg/status Dec 20 08:59:56 m5 kernel: [144210.719252] BUG: unable to handle page fault for address: 0007fb39be0e Dec 20 08:59:56 m5 kernel: [144210.719320] #PF: supervisor read access in kernel mode Dec 20 08:59:56 m5 kernel: [144210.719358] #PF: error_code(0x) - not-present page Dec 20 08:59:56 m5 kernel: [144210.719395] PGD 0 P4D 0 Dec 20 08:59:56 m5 kernel: [144210.719420] Oops: [#1] SMP PTI Dec 20 08:59:56 m5 kernel: [144210.719449] CPU: 139 PID: 3081629 Comm: lsof Not tainted 5.4.0-58-generic #64~18.04.1-Ubuntu Dec 20 08:59:56 m5 kernel: [144210.719505] Hardware name: Dell Inc. PowerEdge R930/0T55KM, BIOS 2.8.1 01/02/2020 Dec 20 08:59:56 m5 kernel: [144210.719563] RIP: 0010:lock_get_status+0x221/0x380 Dec 20 08:59:56 m5 kernel: [144210.719600] Code: fd 7b de 91 4c 89 e7 e8 fd 30 fb ff 4d 85 ed 0f 84 de 00 00 00 49 8b 45 28 4d 8b 4d 40 44 89 f2 48 c7 c6 91 52 d7 91 4c 89 e7 <44> 8b 40 10 44 89 c1 41 81 e0 ff ff 0f 00 c1 e9 14 e8 c9 30 fb ff Dec 20 08:59:56 m5 kernel: [144210.719717] RSP: 0018:b731373efd98 EFLAGS: 00010286 Dec 20 08:59:56 m5 kernel: [144210.719755] RAX: 0007fb39bdfe RBX: 939c33a080d8 RCX: 0001 Dec 20 08:59:56 m5 kernel: [144210.719803] RDX: 0003b0a9 RSI: 91d75291 RDI: 938e2d796800 Dec 20 08:59:56 m5 kernel: [144210.719851] RBP: b731373efdc8 R08: 1000 R09: 93565c5a23b8 Dec 20 08:59:56 m5 kernel: [144210.719899] R10: b731373efe50 R11: 9394905b51d5 R12: 938e2d796800 Dec 20 08:59:56 m5 kernel: [144210.719948] R13: 934002945d90 R14: 0003b0a9 R15: 9390ce8a38a0 Dec 20 08:59:56 m5 kernel: [144210.719997] FS: 7ff9bcbb4040() GS:939c3fa8() knlGS: Dec 20 08:59:56 m5 kernel: [144210.720050] CS: 0010 DS: ES: CR0: 80050033 Dec 20 08:59:56 m5 kernel: [144210.720090] CR2: 0007fb39be0e CR3: 00e75d31a002 CR4: 001606e0 Dec 20 08:59:56 m5 kernel: [144210.720138] DR0: DR1: DR2: Dec 20 08:59:56 m5 kernel: [144210.720186] DR3: DR6: fffe0ff0 DR7: 0400 Dec 20 08:59:56 m5 kernel: [144210.720233] Call Trace: Dec 20 08:59:56 m5 kernel: [144210.720262] locks_show+0x83/0xc0 Dec 20 08:59:56 m5 kernel: [144210.720297] seq_read+0x2a4/0x420 Dec 20 08:59:56 m5 kernel: [144210.720330] proc_reg_read+0x3e/0x60 Dec 20 08:59:56 m5 kernel: [144210.720361] __vfs_read+0x1b/0x40 Dec 20 08:59:56 m5 kernel: [144210.721947] vfs_read+0x8e/0x130 Dec 20 08:59:56 m5 kernel: [144210.723479] ksys_read+0xa7/0xe0 Dec 20 08:59:56 m5 kernel: [144210.725009] __x64_sys_read+0x1a/0x20 Dec 20 08:59:56 m5 kernel: [144210.726545] do_syscall_64+0x57/0x190 Dec 20 08:59:56 m5 kernel: [144210.728064] entry_SYSCALL_64_after_hwframe+0x44/0xa9 Dec 20 08:59:56 m5 kernel: [144210.729580] RIP: 0033:0x7ff9bc48e151 Dec 20 08:59:56 m5 kernel: [144210.731081] Code: fe ff ff 48 8d 3d 3f 9b 0a 00 48 83 ec 08 e8 66 4a 02 00 66 0f 1f 44 00 00 48 8d 05 91 08 2e 00 8b 00 85 c0 75 13 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 57 f3 c3 0f 1f 44 00 00 41 54 55 49 89 d4 53 Dec 20 08:59:56 m5 kernel: [144210.734225] RSP: 002b:7ffc9e915348 EFLAGS: 0246 ORIG_RAX: Dec 20 08:59:56 m5 kernel: [144210.735809] RAX: ffda RBX: 55f16fee7260 RCX: 7ff9bc48e151 Dec 20 08:59:56 m5 kernel: [144210.737396] RDX: 1000 RSI: 55f16fee8d80 RDI: 0003 Dec 20 08:59:56 m5 kernel: [144210.738947] RBP: 0d68 R08: 0001 R09: 55f16fee7340 Dec 20 08:59:56 m5 kernel: [144210.740456] R10: 7ff9bcbb4040 R11: 0246 R12: 7ff9bc765760 Dec 20 08:59:56 m5 kernel: [144210.741923] R13: 7ff9bc7662a0 R14: 55f16fee7260 R15: 0fff Dec 20 08:59:56 m5 kernel: [144210.743353] Modules linked in: ip6table_filter ip6_tables tcp_diag udp_diag inet_diag xt_REDIRECT ip_vs_rr xt_ipvs ip_vs
[Kernel-packages] [Bug 1908912] Re: "BUG: unable to handle page fault for address" 5.4.0-58-generic #64~18.04.1-Ubuntu
apport information ** Tags added: apport-collected uec-images ** Description changed: mezimm00@m5:~$ lsb_release -rd Description:Ubuntu 18.04.5 LTS Release:18.04 mezimm00@m5:~$ apt-cache policy linux-image-5.4.0-58-generic linux-image-5.4.0-58-generic: Installed: 5.4.0-58.64~18.04.1 Candidate: 5.4.0-58.64~18.04.1 Version table: *** 5.4.0-58.64~18.04.1 500 500 http://us.archive.ubuntu.com/ubuntu bionic-updates/main amd64 Packages 500 http://us.archive.ubuntu.com/ubuntu bionic-security/main amd64 Packages 100 /var/lib/dpkg/status Dec 20 08:59:56 m5 kernel: [144210.719252] BUG: unable to handle page fault for address: 0007fb39be0e Dec 20 08:59:56 m5 kernel: [144210.719320] #PF: supervisor read access in kernel mode Dec 20 08:59:56 m5 kernel: [144210.719358] #PF: error_code(0x) - not-present page Dec 20 08:59:56 m5 kernel: [144210.719395] PGD 0 P4D 0 Dec 20 08:59:56 m5 kernel: [144210.719420] Oops: [#1] SMP PTI Dec 20 08:59:56 m5 kernel: [144210.719449] CPU: 139 PID: 3081629 Comm: lsof Not tainted 5.4.0-58-generic #64~18.04.1-Ubuntu Dec 20 08:59:56 m5 kernel: [144210.719505] Hardware name: Dell Inc. PowerEdge R930/0T55KM, BIOS 2.8.1 01/02/2020 Dec 20 08:59:56 m5 kernel: [144210.719563] RIP: 0010:lock_get_status+0x221/0x380 Dec 20 08:59:56 m5 kernel: [144210.719600] Code: fd 7b de 91 4c 89 e7 e8 fd 30 fb ff 4d 85 ed 0f 84 de 00 00 00 49 8b 45 28 4d 8b 4d 40 44 89 f2 48 c7 c6 91 52 d7 91 4c 89 e7 <44> 8b 40 10 44 89 c1 41 81 e0 ff ff 0f 00 c1 e9 14 e8 c9 30 fb ff Dec 20 08:59:56 m5 kernel: [144210.719717] RSP: 0018:b731373efd98 EFLAGS: 00010286 Dec 20 08:59:56 m5 kernel: [144210.719755] RAX: 0007fb39bdfe RBX: 939c33a080d8 RCX: 0001 Dec 20 08:59:56 m5 kernel: [144210.719803] RDX: 0003b0a9 RSI: 91d75291 RDI: 938e2d796800 Dec 20 08:59:56 m5 kernel: [144210.719851] RBP: b731373efdc8 R08: 1000 R09: 93565c5a23b8 Dec 20 08:59:56 m5 kernel: [144210.719899] R10: b731373efe50 R11: 9394905b51d5 R12: 938e2d796800 Dec 20 08:59:56 m5 kernel: [144210.719948] R13: 934002945d90 R14: 0003b0a9 R15: 9390ce8a38a0 Dec 20 08:59:56 m5 kernel: [144210.719997] FS: 7ff9bcbb4040() GS:939c3fa8() knlGS: Dec 20 08:59:56 m5 kernel: [144210.720050] CS: 0010 DS: ES: CR0: 80050033 Dec 20 08:59:56 m5 kernel: [144210.720090] CR2: 0007fb39be0e CR3: 00e75d31a002 CR4: 001606e0 Dec 20 08:59:56 m5 kernel: [144210.720138] DR0: DR1: DR2: Dec 20 08:59:56 m5 kernel: [144210.720186] DR3: DR6: fffe0ff0 DR7: 0400 Dec 20 08:59:56 m5 kernel: [144210.720233] Call Trace: Dec 20 08:59:56 m5 kernel: [144210.720262] locks_show+0x83/0xc0 Dec 20 08:59:56 m5 kernel: [144210.720297] seq_read+0x2a4/0x420 Dec 20 08:59:56 m5 kernel: [144210.720330] proc_reg_read+0x3e/0x60 Dec 20 08:59:56 m5 kernel: [144210.720361] __vfs_read+0x1b/0x40 Dec 20 08:59:56 m5 kernel: [144210.721947] vfs_read+0x8e/0x130 Dec 20 08:59:56 m5 kernel: [144210.723479] ksys_read+0xa7/0xe0 Dec 20 08:59:56 m5 kernel: [144210.725009] __x64_sys_read+0x1a/0x20 Dec 20 08:59:56 m5 kernel: [144210.726545] do_syscall_64+0x57/0x190 Dec 20 08:59:56 m5 kernel: [144210.728064] entry_SYSCALL_64_after_hwframe+0x44/0xa9 Dec 20 08:59:56 m5 kernel: [144210.729580] RIP: 0033:0x7ff9bc48e151 Dec 20 08:59:56 m5 kernel: [144210.731081] Code: fe ff ff 48 8d 3d 3f 9b 0a 00 48 83 ec 08 e8 66 4a 02 00 66 0f 1f 44 00 00 48 8d 05 91 08 2e 00 8b 00 85 c0 75 13 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 57 f3 c3 0f 1f 44 00 00 41 54 55 49 89 d4 53 Dec 20 08:59:56 m5 kernel: [144210.734225] RSP: 002b:7ffc9e915348 EFLAGS: 0246 ORIG_RAX: Dec 20 08:59:56 m5 kernel: [144210.735809] RAX: ffda RBX: 55f16fee7260 RCX: 7ff9bc48e151 Dec 20 08:59:56 m5 kernel: [144210.737396] RDX: 1000 RSI: 55f16fee8d80 RDI: 0003 Dec 20 08:59:56 m5 kernel: [144210.738947] RBP: 0d68 R08: 0001 R09: 55f16fee7340 Dec 20 08:59:56 m5 kernel: [144210.740456] R10: 7ff9bcbb4040 R11: 0246 R12: 7ff9bc765760 Dec 20 08:59:56 m5 kernel: [144210.741923] R13: 7ff9bc7662a0 R14: 55f16fee7260 R15: 0fff Dec 20 08:59:56 m5 kernel: [144210.743353] Modules linked in: ip6table_filter ip6_tables tcp_diag udp_diag inet_diag xt_REDIRECT ip_vs_rr xt_ipvs ip_vs xt_nat xt_tcpudp veth vxlan ip6_udp_tunnel udp_tunnel iptable_mangle xt_mark xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xt_addrtype iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 bpfilter br_netfilter bridge stp llc rpcsec_gss_krb5 auth_rpcgss aufs nfsv4 ceph libceph nfs lockd grace fscache
[Kernel-packages] [Bug 1908912] Re: "BUG: unable to handle page fault for address" 5.4.0-58-generic #64~18.04.1-Ubuntu
After this occurs, I can't execute any new processes, but current processes continue to work. So if I have a shell session up already, it will continue, however any command I run hangs indefinitely. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1908912 Title: "BUG: unable to handle page fault for address" 5.4.0-58-generic #64~18.04.1-Ubuntu Status in linux package in Ubuntu: Incomplete Bug description: mezimm00@m5:~$ lsb_release -rd Description:Ubuntu 18.04.5 LTS Release:18.04 mezimm00@m5:~$ apt-cache policy linux-image-5.4.0-58-generic linux-image-5.4.0-58-generic: Installed: 5.4.0-58.64~18.04.1 Candidate: 5.4.0-58.64~18.04.1 Version table: *** 5.4.0-58.64~18.04.1 500 500 http://us.archive.ubuntu.com/ubuntu bionic-updates/main amd64 Packages 500 http://us.archive.ubuntu.com/ubuntu bionic-security/main amd64 Packages 100 /var/lib/dpkg/status Dec 20 08:59:56 m5 kernel: [144210.719252] BUG: unable to handle page fault for address: 0007fb39be0e Dec 20 08:59:56 m5 kernel: [144210.719320] #PF: supervisor read access in kernel mode Dec 20 08:59:56 m5 kernel: [144210.719358] #PF: error_code(0x) - not-present page Dec 20 08:59:56 m5 kernel: [144210.719395] PGD 0 P4D 0 Dec 20 08:59:56 m5 kernel: [144210.719420] Oops: [#1] SMP PTI Dec 20 08:59:56 m5 kernel: [144210.719449] CPU: 139 PID: 3081629 Comm: lsof Not tainted 5.4.0-58-generic #64~18.04.1-Ubuntu Dec 20 08:59:56 m5 kernel: [144210.719505] Hardware name: Dell Inc. PowerEdge R930/0T55KM, BIOS 2.8.1 01/02/2020 Dec 20 08:59:56 m5 kernel: [144210.719563] RIP: 0010:lock_get_status+0x221/0x380 Dec 20 08:59:56 m5 kernel: [144210.719600] Code: fd 7b de 91 4c 89 e7 e8 fd 30 fb ff 4d 85 ed 0f 84 de 00 00 00 49 8b 45 28 4d 8b 4d 40 44 89 f2 48 c7 c6 91 52 d7 91 4c 89 e7 <44> 8b 40 10 44 89 c1 41 81 e0 ff ff 0f 00 c1 e9 14 e8 c9 30 fb ff Dec 20 08:59:56 m5 kernel: [144210.719717] RSP: 0018:b731373efd98 EFLAGS: 00010286 Dec 20 08:59:56 m5 kernel: [144210.719755] RAX: 0007fb39bdfe RBX: 939c33a080d8 RCX: 0001 Dec 20 08:59:56 m5 kernel: [144210.719803] RDX: 0003b0a9 RSI: 91d75291 RDI: 938e2d796800 Dec 20 08:59:56 m5 kernel: [144210.719851] RBP: b731373efdc8 R08: 1000 R09: 93565c5a23b8 Dec 20 08:59:56 m5 kernel: [144210.719899] R10: b731373efe50 R11: 9394905b51d5 R12: 938e2d796800 Dec 20 08:59:56 m5 kernel: [144210.719948] R13: 934002945d90 R14: 0003b0a9 R15: 9390ce8a38a0 Dec 20 08:59:56 m5 kernel: [144210.719997] FS: 7ff9bcbb4040() GS:939c3fa8() knlGS: Dec 20 08:59:56 m5 kernel: [144210.720050] CS: 0010 DS: ES: CR0: 80050033 Dec 20 08:59:56 m5 kernel: [144210.720090] CR2: 0007fb39be0e CR3: 00e75d31a002 CR4: 001606e0 Dec 20 08:59:56 m5 kernel: [144210.720138] DR0: DR1: DR2: Dec 20 08:59:56 m5 kernel: [144210.720186] DR3: DR6: fffe0ff0 DR7: 0400 Dec 20 08:59:56 m5 kernel: [144210.720233] Call Trace: Dec 20 08:59:56 m5 kernel: [144210.720262] locks_show+0x83/0xc0 Dec 20 08:59:56 m5 kernel: [144210.720297] seq_read+0x2a4/0x420 Dec 20 08:59:56 m5 kernel: [144210.720330] proc_reg_read+0x3e/0x60 Dec 20 08:59:56 m5 kernel: [144210.720361] __vfs_read+0x1b/0x40 Dec 20 08:59:56 m5 kernel: [144210.721947] vfs_read+0x8e/0x130 Dec 20 08:59:56 m5 kernel: [144210.723479] ksys_read+0xa7/0xe0 Dec 20 08:59:56 m5 kernel: [144210.725009] __x64_sys_read+0x1a/0x20 Dec 20 08:59:56 m5 kernel: [144210.726545] do_syscall_64+0x57/0x190 Dec 20 08:59:56 m5 kernel: [144210.728064] entry_SYSCALL_64_after_hwframe+0x44/0xa9 Dec 20 08:59:56 m5 kernel: [144210.729580] RIP: 0033:0x7ff9bc48e151 Dec 20 08:59:56 m5 kernel: [144210.731081] Code: fe ff ff 48 8d 3d 3f 9b 0a 00 48 83 ec 08 e8 66 4a 02 00 66 0f 1f 44 00 00 48 8d 05 91 08 2e 00 8b 00 85 c0 75 13 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 57 f3 c3 0f 1f 44 00 00 41 54 55 49 89 d4 53 Dec 20 08:59:56 m5 kernel: [144210.734225] RSP: 002b:7ffc9e915348 EFLAGS: 0246 ORIG_RAX: Dec 20 08:59:56 m5 kernel: [144210.735809] RAX: ffda RBX: 55f16fee7260 RCX: 7ff9bc48e151 Dec 20 08:59:56 m5 kernel: [144210.737396] RDX: 1000 RSI: 55f16fee8d80 RDI: 0003 Dec 20 08:59:56 m5 kernel: [144210.738947] RBP: 0d68 R08: 0001 R09: 55f16fee7340 Dec 20 08:59:56 m5 kernel: [144210.740456] R10: 7ff9bcbb4040 R11: 0246 R12: 7ff9bc765760 Dec 20 08:59:56 m5 kernel: [144210.741923] R13: 7ff9bc7662a0 R14: 55f16fee7260 R15: 0fff Dec 20 08:59:56 m5 kernel: [144210.743353] Modules linked in: