You are not logged in.

#1 2018-01-15 14:10:47

mathiasringhof
Member
Registered: 2018-01-15
Posts: 1

Weird kernel error with CIFS / general protection fault

Hi,

I've been using Arch as my virtual desktop for some time now, but for the past weeks applications started hanging and I have kernel error messages in the log.

Googling had me change the SMB protocol version used from 2.1 to 2.0 or 3.0, which did not help the situation. The machine is a VM on a CentOS whitebox with QEMU-KVM 2.9 from CentOS virt SIG. I double-checked the RAM of the host using memtest, everything else works fine.

Here's an example of an fstab entry:

//freenas.local.foo.bar/movies    /mnt/movies             cifs    credentials=FOO,uid=FOO,gid=FOO,rw,vers=3.0

The most recent example:

Jan 15 14:20:58 archstation kernel: CIFS VFS: Free previous auth_key.response = ffff9b09d8304700
Jan 15 14:36:57 archstation kernel: CIFS VFS: Free previous auth_key.response = ffff9b09d9f80800
Jan 15 14:36:58 archstation kernel: CIFS VFS: Free previous auth_key.response = ffff9b0a43409900
Jan 15 14:52:57 archstation kernel: CIFS VFS: Free previous auth_key.response = ffff9b0a49803800
Jan 15 14:52:59 archstation kernel: CIFS VFS: Free previous auth_key.response = ffff9b0a49803400
Jan 15 15:00:03 archstation kernel: BUG: unable to handle kernel paging request at ffff9b0a74330000
Jan 15 15:00:03 archstation kernel: IP: memcpy_erms+0x6/0x10
Jan 15 15:00:03 archstation kernel: PGD 7a62a067 P4D 7a62a067 PUD 7a62e067 PMD 134221063 PTE 8000000134330061
Jan 15 15:00:03 archstation kernel: Oops: 0003 [#1] PREEMPT SMP PTI
Jan 15 15:00:03 archstation kernel: Modules linked in: cmac rpcsec_gss_krb5 auth_rpcgss oid_registry arc4 md4 nfsv4 nls_utf8 nfs cifs lockd grace sunrpc ccm dns_resolver
Jan 15 15:00:03 archstation kernel: CPU: 1 PID: 12069 Comm: java Not tainted 4.14.13-1-ARCH #1
Jan 15 15:00:03 archstation kernel: Hardware name: Red Hat KVM, BIOS 1.10.2-3.el7_4.1 04/01/2014
Jan 15 15:00:03 archstation kernel: task: ffff9b0a6b69bf00 task.stack: ffffad5d0837c000
Jan 15 15:00:03 archstation kernel: RIP: 0010:memcpy_erms+0x6/0x10
Jan 15 15:00:03 archstation kernel: RSP: 0018:ffffad5d0837fae8 EFLAGS: 00010246
Jan 15 15:00:03 archstation kernel: RAX: ffff9b0a7432fe24 RBX: ffff9b0a43b91a80 RCX: 00000000000000ae
Jan 15 15:00:03 archstation kernel: RDX: 000000000000028a RSI: ffff9b09d9ee41dc RDI: ffff9b0a74330000
Jan 15 15:00:03 archstation kernel: RBP: ffff9b0a74bd7800 R08: 0000000000000011 R09: 0000000000000000
Jan 15 15:00:03 archstation kernel: R10: 0000000000000dc0 R11: 0000000000003c00 R12: ffff9b0a779b0200
Jan 15 15:00:03 archstation kernel: R13: ffffad5d0837fba8 R14: ffff9b0a7432fdc0 R15: ffffad5d0837fba4
Jan 15 15:00:03 archstation kernel: FS:  00007fc1db13a700(0000) GS:ffff9b0a7fd00000(0000) knlGS:0000000000000000
Jan 15 15:00:03 archstation kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 15 15:00:03 archstation kernel: CR2: ffff9b0a74330000 CR3: 0000000108ad2005 CR4: 00000000003606e0
Jan 15 15:00:03 archstation kernel: DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
Jan 15 15:00:03 archstation kernel: DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Jan 15 15:00:03 archstation kernel: Call Trace:
Jan 15 15:00:03 archstation kernel:  send_set_info+0x131/0x230 [cifs]
Jan 15 15:00:03 archstation kernel:  SMB2_set_ea+0x42/0x50 [cifs]
Jan 15 15:00:03 archstation kernel:  smb2_set_ea+0x1b0/0x290 [cifs]
Jan 15 15:00:03 archstation kernel:  ? build_path_from_dentry_optional_prefix+0x202/0x3f0 [cifs]
Jan 15 15:00:03 archstation kernel:  cifs_xattr_set+0x228/0x380 [cifs]
Jan 15 15:00:03 archstation kernel:  __vfs_setxattr+0x64/0x80
Jan 15 15:00:03 archstation kernel:  __vfs_setxattr_noperm+0x69/0x1a0
Jan 15 15:00:03 archstation kernel:  vfs_setxattr+0xa0/0xb0
Jan 15 15:00:03 archstation kernel:  setxattr+0x142/0x1b0
Jan 15 15:00:03 archstation kernel:  ? pick_next_task_fair+0x2d2/0x560
Jan 15 15:00:03 archstation kernel:  ? __switch_to+0x129/0x4e0
Jan 15 15:00:03 archstation kernel:  ? __alloc_fd+0xaf/0x160
Jan 15 15:00:03 archstation kernel:  SyS_fsetxattr+0x79/0xa0
Jan 15 15:00:03 archstation kernel:  entry_SYSCALL_64_fastpath+0x1a/0x7d
Jan 15 15:00:03 archstation kernel: RIP: 0033:0x7fc1fc425e2a
Jan 15 15:00:03 archstation kernel: RSP: 002b:00007fc1db137208 EFLAGS: 00000246
Jan 15 15:00:03 archstation kernel: Code: 90 90 90 90 90 eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1
Jan 15 15:00:03 archstation kernel: RIP: memcpy_erms+0x6/0x10 RSP: ffffad5d0837fae8
Jan 15 15:00:03 archstation kernel: CR2: ffff9b0a74330000
Jan 15 15:00:03 archstation kernel: ---[ end trace 5f155c8fd0b3ee77 ]---

One more example, this time general protection fault is spelled out:

Jan 12 07:32:11 archstation kernel: general protection fault: 0000 [#1] PREEMPT SMP PTI
Jan 12 07:32:11 archstation kernel: Modules linked in: rpcsec_gss_krb5 auth_rpcgss oid_registry nfsv4 arc4 md4 nfs lockd nls_utf8 grace cifs sunrpc ccm dns_resolver fscache moused
Jan 12 07:32:11 archstation kernel: CPU: 0 PID: 336 Comm: cifsd Not tainted 4.14.13-1-ARCH #1
Jan 12 07:32:11 archstation kernel: Hardware name: Red Hat KVM, BIOS 1.10.2-3.el7_4.1 04/01/2014
Jan 12 07:32:11 archstation kernel: task: ffff9418b70b8000 task.stack: ffffa82f80a8c000
Jan 12 07:32:11 archstation kernel: RIP: 0010:prefetch_freepointer+0x11/0x20
Jan 12 07:32:11 archstation kernel: RSP: 0018:ffffa82f80a8fde0 EFLAGS: 00010206
Jan 12 07:32:11 archstation kernel: RAX: 0000000000000000 RBX: 2f61ba177fcce365 RCX: 00000000156a5280
Jan 12 07:32:11 archstation kernel: RDX: 00000000156a5200 RSI: 2f61ba177fcce365 RDI: ffff9418ba4e6a80
Jan 12 07:32:11 archstation kernel: RBP: 0000000001011200 R08: 0000673900aeafba R09: ffff9418b3a5f6c0
Jan 12 07:32:11 archstation kernel: R10: 0000000000000010 R11: 000000000000003e R12: ffff9418b3a5fa40
Jan 12 07:32:11 archstation kernel: R13: ffff9418ba4e6a80 R14: ffff9418ba4e6a80 R15: ffffffffad1982d0
Jan 12 07:32:11 archstation kernel: FS:  0000000000000000(0000) GS:ffff9418bfc00000(0000) knlGS:0000000000000000
Jan 12 07:32:11 archstation kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 12 07:32:11 archstation kernel: CR2: 00000001005c20c8 CR3: 000000013900a001 CR4: 00000000003606f0
Jan 12 07:32:11 archstation kernel: DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
Jan 12 07:32:11 archstation kernel: DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Jan 12 07:32:11 archstation kernel: Call Trace:
Jan 12 07:32:11 archstation kernel:  kmem_cache_alloc+0x94/0x1a0
Jan 12 07:32:11 archstation kernel:  ? wait_woken+0x80/0x80
Jan 12 07:32:11 archstation kernel:  mempool_alloc+0x60/0x180
Jan 12 07:32:11 archstation kernel:  ? try_to_wake_up+0x55/0x460
Jan 12 07:32:11 archstation kernel:  cifs_small_buf_get+0x16/0x20 [cifs]
Jan 12 07:32:11 archstation kernel:  cifs_demultiplex_thread+0x5c3/0xab0 [cifs]
Jan 12 07:32:11 archstation kernel:  ? cifs_handle_standard+0x180/0x180 [cifs]
Jan 12 07:32:11 archstation kernel:  kthread+0x118/0x130
Jan 12 07:32:11 archstation kernel:  ? kthread_create_on_node+0x70/0x70
Jan 12 07:32:11 archstation kernel:  ? do_group_exit+0x3a/0xa0
Jan 12 07:32:11 archstation kernel:  ret_from_fork+0x1f/0x30
Jan 12 07:32:11 archstation kernel: Code: c1 9b ed ff eb b9 48 8b 75 60 48 c7 c7 00 3e e0 ad e8 af 9b ed ff eb 93 66 90 0f 1f 44 00 00 48 85 f6 74 14 48 63 47 20 48 01 c6 <48> 33
Jan 12 07:32:11 archstation kernel: RIP: prefetch_freepointer+0x11/0x20 RSP: ffffa82f80a8fde0
Jan 12 07:32:11 archstation kernel: ---[ end trace f2163e78515abd48 ]---
Jan 12 07:32:45 archstation kernel: general protection fault: 0000 [#2] PREEMPT SMP PTI
Jan 12 07:32:45 archstation kernel: Modules linked in: rpcsec_gss_krb5 auth_rpcgss oid_registry nfsv4 arc4 md4 nfs lockd nls_utf8 grace cifs sunrpc ccm dns_resolver fscache moused
Jan 12 07:32:45 archstation kernel: CPU: 0 PID: 337 Comm: cifsd Tainted: G      D         4.14.13-1-ARCH #1
Jan 12 07:32:45 archstation kernel: Hardware name: Red Hat KVM, BIOS 1.10.2-3.el7_4.1 04/01/2014
Jan 12 07:32:45 archstation kernel: task: ffff9418ba5b4ec0 task.stack: ffffa82f80aac000
Jan 12 07:32:45 archstation kernel: RIP: 0010:prefetch_freepointer+0x11/0x20
Jan 12 07:32:45 archstation kernel: RSP: 0018:ffffa82f80aafde0 EFLAGS: 00010206
Jan 12 07:32:45 archstation kernel: RAX: 0000000000000000 RBX: 2f61ba177fcce365 RCX: 00000000156a5380
Jan 12 07:32:45 archstation kernel: RDX: 00000000156a5300 RSI: 2f61ba177fcce365 RDI: ffff9418ba4e6a80
Jan 12 07:32:45 archstation kernel: RBP: 0000000001011200 R08: 0000000000000000 R09: ffffa82f80aafe38
Jan 12 07:32:45 archstation kernel: R10: ffffa82f80aafda0 R11: 0000000000000000 R12: ffff9418b3a5fc00
Jan 12 07:32:45 archstation kernel: R13: ffff9418ba4e6a80 R14: ffff9418ba4e6a80 R15: ffffffffad1982d0
Jan 12 07:32:45 archstation kernel: FS:  0000000000000000(0000) GS:ffff9418bfc00000(0000) knlGS:0000000000000000
Jan 12 07:32:45 archstation kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 12 07:32:45 archstation kernel: CR2: 0000563001d29000 CR3: 000000013900a005 CR4: 00000000003606f0
Jan 12 07:32:45 archstation kernel: DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
Jan 12 07:32:45 archstation kernel: DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Jan 12 07:32:45 archstation kernel: Call Trace:
Jan 12 07:32:45 archstation kernel:  kmem_cache_alloc+0x94/0x1a0
Jan 12 07:32:45 archstation kernel:  ? wait_woken+0x80/0x80
Jan 12 07:32:45 archstation kernel:  mempool_alloc+0x60/0x180
Jan 12 07:32:45 archstation kernel:  ? __wake_up_common_lock+0x89/0xc0
Jan 12 07:32:45 archstation kernel:  cifs_small_buf_get+0x16/0x20 [cifs]
Jan 12 07:32:45 archstation kernel:  cifs_demultiplex_thread+0x5c3/0xab0 [cifs]
Jan 12 07:32:45 archstation kernel:  ? cifs_handle_standard+0x180/0x180 [cifs]
Jan 12 07:32:45 archstation kernel:  kthread+0x118/0x130
Jan 12 07:32:45 archstation kernel:  ? kthread_create_on_node+0x70/0x70
Jan 12 07:32:45 archstation kernel:  ? SyS_exit_group+0x10/0x10
Jan 12 07:32:45 archstation kernel:  ret_from_fork+0x1f/0x30
Jan 12 07:32:45 archstation kernel: Code: c1 9b ed ff eb b9 48 8b 75 60 48 c7 c7 00 3e e0 ad e8 af 9b ed ff eb 93 66 90 0f 1f 44 00 00 48 85 f6 74 14 48 63 47 20 48 01 c6 <48> 33
Jan 12 07:32:45 archstation kernel: RIP: prefetch_freepointer+0x11/0x20 RSP: ffffa82f80aafde0

I'm out of ideas what to do, any pointers are appreciated.

Thanks for the help in advance!
Mathias

Offline

#2 2018-03-02 05:53:22

benalexau
Member
Registered: 2013-10-10
Posts: 19

Re: Weird kernel error with CIFS / general protection fault

I've also been seeing CIFS protection faults. Possible related bug report at https://bugs.archlinux.org/task/57474. At that URL I have also included a workaround that appears to resolve this.

Last edited by benalexau (2018-03-02 06:52:28)

Offline

#3 2018-03-02 10:29:28

R00KIE
Forum Fellow
From: Between a computer and a chair
Registered: 2008-09-14
Posts: 4,734

Re: Weird kernel error with CIFS / general protection fault

@mathiasringhof
Welcome to the forums.

Please use code tags, not quote tags when pasting code, logs, or the output of commands. https://wiki.archlinux.org/index.php/Co … s_and_code


R00KIE
Tm90aGluZyB0byBzZWUgaGVyZSwgbW92ZSBhbG9uZy4K

Offline

Board footer

Powered by FluxBB