System crashes with "Unable to handle kernel paging request for data at address 0x94d7c8ff000000" at .memset+0x60 from kmem_cache_alloc()
Issue
- System crashes with "Unable to handle kernel paging request for data at address 0x94d7c8ff000000" at .memset+0x60 from kmem_cache_alloc().
crash> bt
PID: 6675 TASK: c0000003c70c9600 CPU: 21 COMMAND: "db2sysc"
#0 [c0000003c77ae100] .crash_kexec at c0000000000ec0d8
#1 [c0000003c77ae300] .die at c000000000031638
#2 [c0000003c77ae3b0] .bad_page_fault at c000000000044bd8
#3 [c0000003c77ae430] handle_page_fault at c000000000005228
Data Access [300] exception frame:
R0: 0000000000000004 R1: c0000003c77ae720 R2: c000000000f8e480
R3: 0094d7c8ff000000 R4: 0000000000000000 R5: 0000000000000000
R6: 0094d7c8ff000000 R7: ffffffff80000000 R8: c0000007be031700
R9: 0000000000000000 R10: c0000007b15aef80 R11: 0000000000000000
R12: 0000000028284428 R13: c000000001075980 R14: 0000000000000000
R15: 0000000000000000 R16: 0000000000010000 R17: 0000000000000000
R18: 000000000fd00000 R19: c0000007af0c7b98 R20: c0000007b9aa14b8
R21: c0000007b9aa13c8 R22: 0000000000000100 R23: c0000007b1f52700
R24: 0000000000000000 R25: 0000000000020000 R26: 0000000000000000
R27: 0000000000008020 R28: c0000007af58d180 R29: 0000000000008020
R30: c000000000f220d0 R31: 0094d7c8ff000000
NIP: c0000000000503c0 MSR: 8000000000009032 OR3: c0000003c77ae630
CTR: 0000000000000004 LR: c0000000001baca0 XER: 0000000000000010
CCR: 0000000044284420 MQ: 0000000000000000 DAR: 0094d7c8ff000000
DSISR: 0000000042000000 Syscall Result: 0000000000000000
#4 [c0000003c77ae720] .memset at c0000000000503c0
[Link Register] [c0000003c77ae720] .kmem_cache_alloc at c0000000001baca0
#5 [c0000003c77ae7d0] .scsi_pool_alloc_command at c0000000003ea8b8
#6 [c0000003c77ae860] .scsi_host_alloc_command at c0000000003ea9b0
#7 [c0000003c77ae8f0] .__scsi_get_command at c0000000003eaa50
#8 [c0000003c77ae980] .scsi_get_command at c0000000003ead88
#9 [c0000003c77aea20] .scsi_setup_fs_cmnd at c0000000003f4e20
#10 [c0000003c77aeab0] .sd_prep_fn at d000000004684f78 [sd_mod]
#11 [c0000003c77aeb90] .blk_peek_request at c0000000002e6194
#12 [c0000003c77aec40] .scsi_request_fn at c0000000003f3e24
#13 [c0000003c77aed30] .__blk_run_queue at c0000000002e7208
#14 [c0000003c77aedb0] .elv_insert at c0000000002ddd64
#15 [c0000003c77aee50] .blk_insert_cloned_request at c0000000002e5250
#16 [c0000003c77aeee0] .dm_dispatch_request at d000000003f346fc [dm_mod]
#17 [c0000003c77aef60] .dm_request_fn at d000000003f357ac [dm_mod]
#18 [c0000003c77af070] .__blk_run_queue at c0000000002e7208
#19 [c0000003c77af0f0] .cfq_insert_request at c000000000303cec
#20 [c0000003c77af1a0] .elv_insert at c0000000002ddcec
#21 [c0000003c77af240] .blk_queue_bio at c0000000002e81e0
#22 [c0000003c77af310] .generic_make_request at c0000000002e55a0
#23 [c0000003c77af400] .submit_bio at c0000000002e5870
#24 [c0000003c77af4d0] .__blockdev_direct_IO_newtrunc at c000000000217558
#25 [c0000003c77af780] .__blockdev_direct_IO at c0000000002195fc
#26 [c0000003c77af850] .ext4_ind_direct_IO at d000000004bb9314 [ext4]
#27 [c0000003c77af960] .generic_file_aio_read at c000000000158f2c
#28 [c0000003c77afab0] .do_sync_readv_writev at c0000000001ce57c
#29 [c0000003c77afc40] .do_readv_writev at c0000000001cef68
#30 [c0000003c77afd80] .sys_readv at c0000000001cf4d8
#31 [c0000003c77afe30] syscall_exit at c000000000008564
System Call [c01] exception frame:
R0: 0000000000000091 R1: 00000fff85bed1f0 R2: 000000805bfd32d8
R3: 000000000000001e R4: 00000fff808b1d20 R5: 0000000000000020
R6: 0000000000000000 R7: 000000000000001f R8: 800000000000d032
R9: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000
R12: 0000000000000000 R13: 00000fff85bf68f0
NIP: 000000805bf103a0 MSR: 800000000000d032 OR3: 000000000000001e
CTR: 000000805bf10310 LR: 000000805bf10384 XER: 0000000020000010
CCR: 0000000044022488 MQ: 0000000000000001 DAR: 00000ff93477201c
DSISR: 0000000040000000 Syscall Result: 000000041e640000
Environment
- Red Hat Enterprise Linux 6
- ppc64
- ipr driver
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.