UNRaid kernel: traps: lsof[28497] general protection fault ip:


Recommended Posts

Have same errors during rclone backup over samba to a second unraid server (using unassigned drive mount).

Accessing the mount in any way often hangs during seeing these "general protection fault".

 

I specifically notice this during backup of container data files of "loki" and "tdarr".

For "loki" its especially the files in "/loki/chunks".

For "tdarr" the files in /app/server/Tdarr/DB2/ResJSONDB.

Don't know much about the specifics of those files, but both directories contains tons of highly volatile files that changes all the time. But I have it even if I stop the containers. So it doesn't seem to be the problem of only accessing "in use" files (rclone usually throws just an error and continues, this worked in the past without problems.).

Maybe a combination of the amount of files and maybe (guess) shfs which screws it up so it's also a problem when containers are stopped. Sometimes find some ".fuse_hidden..." files.

Usually the system just reacts slowly during accessing these files and samba mount related access is slow or with some freezes. But as soon as I force kill all backup processes the system seems to recover.

Can't say for sure when this started, currently on 6.11.5.

When I exclude these directories I get a backup run without these "general protection fault" entries in the log.

 

Preparing for upgrade to 6.12 ... and will try the "Exclusive Shares" for container files... this may help and at least eliminates the factor of the fuse layer on that files.

 

Edited by spali
Link to comment
  • 1 month later...

I have seen this issue on my server since 6.8.x, I am now on 6.12.2.  I have done memtest, rebuilt boot device, unplugged USB devices, etc. nothing worked.

I finally narrowed it down to binhex-Sonarr and binhex-NZBget docker images.  If these docker images are running my system randomly kernel traps with lsof general protection fault.

I have searched up binhex Sonarr container images and this is a known issue but it has not yet been resolved.  So I kept my old standalone system running with Sonarr and NZBget installed natively.  This is not my preferred solution but until it is fixed I cant have my server rebooting randomly multiple times a day. 

 

All docker images are up to date as well.

 

Just started NZBget docker image today to see if it is still causing it; sure enough it is.

 

Aug  2 23:56:55 Tower kernel: traps: lsof[25144] general protection fault ip:14ed4092dc6e sp:69408a505fbd78cd error:0 in libc-2.37.so[14ed40915000+169000]
Aug  3 00:04:50 Tower kernel: traps: lsof[30401] general protection fault ip:148af8378c6e sp:adcd2e73629ddb44 error:0 in libc-2.37.so[148af8360000+169000]
Aug  3 00:04:50 Tower kern

tower-diagnostics-20230803-0129.zip

Edited by jasonbigler
added more thoughts and diag report
  • Upvote 1
Link to comment
  • 2 weeks later...
  • 4 months later...

How is it this hasn't gotten an official response yet? This is years old, and still happening. I woke up this morning to multiple lines of 

kernel: traps: lsof[31740] general protection fault ip:145f5f1d1c6e sp:62fd81e8b1aaeb0c error:0 in libc-2.37.so[145f5f1b9000+169000]

I don't run krusader at all.

Link to comment
  • 2 weeks later...
  • 4 weeks later...

Dear all,

I am facing the same problem, but I have been able to circle in on it.
It is reproducable and occurs when copying onto my cache drive.
It does not matter from where to copy (external smb mounts or attached USB drives ). 
Error keeps appearing within some seconds and is followed by a kernel crash.

My cache is build on two NVME M2 2TB drives.

Attached please find my diagnostics file.

 

Any news on the reported bug status?
Would it make sense to file a new / updated one?

 

Regards, 
Lars

 

(....)

Jan 30 07:30:47 Unraid kernel: traps: sh[13778] general protection fault ip:4770ce sp:7ffd0742f860 error:0 in bash[426000+c5000]
Jan 30 07:30:47 Unraid kernel: general protection fault, probably for non-canonical address 0xcf00000000000000: 0000 [#1] PREEMPT SMP NOPTI
Jan 30 07:30:47 Unraid kernel: CPU: 3 PID: 13814 Comm: cache_dirs Tainted: P           O       6.1.64-Unraid #1
Jan 30 07:30:47 Unraid kernel: Hardware name: ASUS System Product Name/TUF GAMING B450-PLUS II, BIOS 4402 12/13/2023
Jan 30 07:30:47 Unraid kernel: RIP: 0010:__rb_insert_augmented+0xb9/0x157
Jan 30 07:30:47 Unraid kernel: Code: 48 89 43 10 49 89 58 08 74 0a 48 89 da 48 83 ca 01 48 89 10 31 c9 4c 89 ea 4c 89 c6 e9 86 00 00 00 48 8b 43 10 48 85 c0 74 27 <f6> 00 01 75 22 48 89 da 48 83 ca 01 48 89 10 49 89 10 48 8b 03 48
Jan 30 07:30:47 Unraid kernel: RSP: 0018:ffffc90012107c90 EFLAGS: 00010286
Jan 30 07:30:47 Unraid kernel: RAX: cf00000000000000 RBX: ffff888f89af4bf8 RCX: ffff88817ec5ece8
Jan 30 07:30:47 Unraid kernel: RDX: ffffffff811d9645 RSI: ffff888f7a794148 RDI: ffff888f77676bf8
Jan 30 07:30:47 Unraid kernel: RBP: ffff888f77676bf8 R08: ffff888f7a794148 R09: 0000000000000000
Jan 30 07:30:47 Unraid kernel: R10: 0000000000000001 R11: ffff88814d7b1008 R12: ffffffff811d9645
Jan 30 07:30:47 Unraid kernel: R13: ffff888108691ff8 R14: ffff888f77676bd0 R15: ffff888108691fb0
Jan 30 07:30:47 Unraid kernel: FS:  0000154d52b14740(0000) GS:ffff888fee2c0000(0000) knlGS:0000000000000000
Jan 30 07:30:47 Unraid kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 30 07:30:47 Unraid kernel: CR2: 00000000005dbc60 CR3: 0000000f8454e000 CR4: 0000000000750ee0
Jan 30 07:30:47 Unraid kernel: PKRU: 55555554
Jan 30 07:30:47 Unraid kernel: Call Trace:
Jan 30 07:30:47 Unraid kernel: <TASK>
Jan 30 07:30:47 Unraid kernel: ? __die_body+0x1a/0x5c
Jan 30 07:30:47 Unraid kernel: ? die_addr+0x38/0x51
Jan 30 07:30:47 Unraid kernel: ? exc_general_protection+0x30f/0x345
Jan 30 07:30:47 Unraid kernel: ? asm_exc_general_protection+0x22/0x30
Jan 30 07:30:47 Unraid kernel: ? vma_interval_tree_augment_copy+0xd/0xd
Jan 30 07:30:47 Unraid kernel: ? vma_interval_tree_augment_copy+0xd/0xd
Jan 30 07:30:47 Unraid kernel: ? __rb_insert_augmented+0xb9/0x157
Jan 30 07:30:47 Unraid kernel: dup_mmap+0x347/0x551
Jan 30 07:30:47 Unraid kernel: copy_process+0xb59/0x16aa
Jan 30 07:30:47 Unraid kernel: kernel_clone+0xa5/0x2aa
Jan 30 07:30:47 Unraid kernel: __do_sys_clone+0x65/0x8b
Jan 30 07:30:47 Unraid kernel: do_syscall_64+0x6b/0x81
Jan 30 07:30:47 Unraid kernel: entry_SYSCALL_64_after_hwframe+0x64/0xce
Jan 30 07:30:47 Unraid kernel: RIP: 0033:0x154d52bf2383
Jan 30 07:30:47 Unraid kernel: Code: 00 e8 91 75 f5 ff 90 64 48 8b 04 25 10 00 00 00 45 31 c0 31 d2 31 f6 bf 11 00 20 01 4c 8d 90 d0 02 00 00 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 89 c2 85 c0 75 2c 64 48 8b 04 25 10 00 00
Jan 30 07:30:47 Unraid kernel: RSP: 002b:00007ffe40e90888 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
Jan 30 07:30:47 Unraid kernel: RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000154d52bf2383
Jan 30 07:30:47 Unraid kernel: RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011
Jan 30 07:30:47 Unraid kernel: RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
Jan 30 07:30:47 Unraid kernel: R10: 0000154d52b14a10 R11: 0000000000000246 R12: 0000000000000001
Jan 30 07:30:47 Unraid kernel: R13: 00007ffe40e90ab0 R14: 00000000004eebb7 R15: 000000000000357b
Jan 30 07:30:47 Unraid kernel: </TASK>
Jan 30 07:30:47 Unraid kernel: Modules linked in: xt_CHECKSUM ipt_REJECT nf_reject_ipv4 ip6table_mangle ip6table_nat iptable_mangle vhost_net tun vhost vhost_iotlb tap cmac cifs asn1_decoder cifs_arc4 cifs_md4 dns_resolver veth xt_nat xt_tcpudp xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype br_netfilter xfs nfsd auth_rpcgss oid_registry lockd grace sunrpc md_mod zfs(PO) zunicode(PO) zzstd(O) zlua(O) zavl(PO) icp(PO) zcommon(PO) znvpair(PO) spl(O) tcp_diag inet_diag it87(O) hwmon_vid ip6table_filter ip6_tables iptable_filter ip_tables x_tables bridge stp llc bonding tls amdgpu edac_mce_amd edac_core intel_rapl_msr intel_rapl_common iosf_mbi gpu_sched drm_buddy kvm_amd i2c_algo_bit drm_ttm_helper ttm drm_display_helper drm_kms_helper kvm drm crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel sha512_ssse3 sha256_ssse3 sha1_ssse3 wmi_bmof aesni_intel crypto_simd cryptd agpgart rapl i2c_piix4
Jan 30 07:30:47 Unraid kernel: nvme r8169 i2c_core k10temp ahci joydev input_leds nvme_core syscopyarea sysfillrect ccp led_class sysimgblt libahci fb_sys_fops realtek tpm_crb video tpm_tis tpm_tis_core wmi tpm backlight button acpi_cpufreq unix
Jan 30 07:30:47 Unraid kernel: ---[ end trace 0000000000000000 ]---
Jan 30 07:30:47 Unraid kernel: RIP: 0010:__rb_insert_augmented+0xb9/0x157
Jan 30 07:30:47 Unraid kernel: Code: 48 89 43 10 49 89 58 08 74 0a 48 89 da 48 83 ca 01 48 89 10 31 c9 4c 89 ea 4c 89 c6 e9 86 00 00 00 48 8b 43 10 48 85 c0 74 27 <f6> 00 01 75 22 48 89 da 48 83 ca 01 48 89 10 49 89 10 48 8b 03 48
Jan 30 07:30:47 Unraid kernel: RSP: 0018:ffffc90012107c90 EFLAGS: 00010286
Jan 30 07:30:47 Unraid kernel: RAX: cf00000000000000 RBX: ffff888f89af4bf8 RCX: ffff88817ec5ece8
Jan 30 07:30:47 Unraid kernel: RDX: ffffffff811d9645 RSI: ffff888f7a794148 RDI: ffff888f77676bf8
Jan 30 07:30:47 Unraid kernel: RBP: ffff888f77676bf8 R08: ffff888f7a794148 R09: 0000000000000000
Jan 30 07:30:47 Unraid kernel: R10: 0000000000000001 R11: ffff88814d7b1008 R12: ffffffff811d9645
Jan 30 07:30:47 Unraid kernel: R13: ffff888108691ff8 R14: ffff888f77676bd0 R15: ffff888108691fb0
Jan 30 07:30:47 Unraid kernel: FS:  0000154d52b14740(0000) GS:ffff888fee2c0000(0000) knlGS:0000000000000000
Jan 30 07:30:47 Unraid kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 30 07:30:47 Unraid kernel: CR2: 00000000005dbc60 CR3: 0000000f8454e000 CR4: 0000000000750ee0
Jan 30 07:30:47 Unraid kernel: PKRU: 55555554
Jan 30 07:30:47 Unraid kernel: general protection fault, probably for non-canonical address 0x62ff888f89ad4ca8: 0000 [#2] PREEMPT SMP NOPTI
Jan 30 07:30:47 Unraid kernel: CPU: 1 PID: 13816 Comm: sh Tainted: P      D    O       6.1.64-Unraid #1
Jan 30 07:30:47 Unraid kernel: Hardware name: ASUS System Product Name/TUF GAMING B450-PLUS II, BIOS 4402 12/13/2023
Jan 30 07:30:47 Unraid kernel: RIP: 0010:kmem_cache_alloc+0xa4/0x14d
Jan 30 07:30:47 Unraid kernel: Code: 04 24 74 05 48 85 c0 75 1a 45 89 f0 4c 89 f9 83 ca ff 44 89 e6 48 89 ef e8 2a fc ff ff 48 89 04 24 eb 25 8b 4d 28 48 8b 7d 00 <48> 8b 1c 08 48 8d 8a 00 01 00 00 65 48 0f c7 0f 0f 94 c0 84 c0 74
Jan 30 07:30:47 Unraid kernel: RSP: 0018:ffffc9001392f9c8 EFLAGS: 00010206
Jan 30 07:30:47 Unraid kernel: RAX: 62ff888f89ad4c60 RBX: ffff888f89ad4bd0 RCX: 0000000000000048
Jan 30 07:30:47 Unraid kernel: RDX: 000000010a76f201 RSI: 0000000000000cc0 RDI: 00000000000322f0
Jan 30 07:30:47 Unraid kernel: RBP: ffff8881001e6b00 R08: 0000000000000cc0 R09: 0000000000000000
Jan 30 07:30:47 Unraid kernel: R10: ffff88814e264808 R11: ffff88814e26480c R12: 0000000000000cc0
Jan 30 07:30:47 Unraid kernel: R13: ffff8881001e6b00 R14: 0000000000000090 R15: ffffffff8106a720
Jan 30 07:30:47 Unraid kernel: FS:  0000000000000000(0000) GS:ffff888fee240000(0000) knlGS:0000000000000000
Jan 30 07:30:47 Unraid kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 30 07:30:47 Unraid kernel: CR2: 0000000000530e68 CR3: 0000000f0cb66000 CR4: 0000000000750ee0
Jan 30 07:30:47 Unraid kernel: PKRU: 55555554
Jan 30 07:30:47 Unraid kernel: Call Trace:
Jan 30 07:30:47 Unraid kernel: <TASK>
Jan 30 07:30:47 Unraid kernel: ? __die_body+0x1a/0x5c
Jan 30 07:30:47 Unraid kernel: ? die_addr+0x38/0x51
Jan 30 07:30:47 Unraid kernel: ? exc_general_protection+0x30f/0x345
Jan 30 07:30:47 Unraid kernel: ? asm_exc_general_protection+0x22/0x30
Jan 30 07:30:47 Unraid kernel: ? vm_area_dup+0x21/0x87
Jan 30 07:30:47 Unraid kernel: ? kmem_cache_alloc+0xa4/0x14d
Jan 30 07:30:47 Unraid kernel: ? kmem_cache_alloc+0x4e/0x14d
Jan 30 07:30:47 Unraid kernel: vm_area_dup+0x21/0x87
Jan 30 07:30:47 Unraid kernel: ? __mod_node_page_state+0x87/0x9a
Jan 30 07:30:47 Unraid kernel: ? cgroup_rstat_updated+0x21/0xa5
Jan 30 07:30:47 Unraid kernel: ? memcg_rstat_updated+0x23/0x77
Jan 30 07:30:47 Unraid kernel: ? mas_data_end+0x35/0x6a
Jan 30 07:30:47 Unraid kernel: ? slab_post_alloc_hook+0x4d/0x15e
Jan 30 07:30:47 Unraid kernel: ? slab_post_alloc_hook+0x4d/0x15e
Jan 30 07:30:47 Unraid kernel: ? memcg_slab_free_hook+0x20/0xcf
Jan 30 07:30:47 Unraid kernel: ? slab_free_freelist_hook.constprop.0+0x3b/0xaf
Jan 30 07:30:47 Unraid kernel: ? memcg_slab_free_hook+0x20/0xcf
Jan 30 07:30:47 Unraid kernel: ? slab_post_alloc_hook+0x4d/0x15e
Jan 30 07:30:47 Unraid kernel: ? slab_post_alloc_hook+0x4d/0x15e
Jan 30 07:30:47 Unraid kernel: ? kmem_cache_alloc_bulk+0x1c4/0x220
Jan 30 07:30:47 Unraid kernel: ? mas_alloc_nodes+0xf6/0x175
Jan 30 07:30:47 Unraid kernel: __split_vma+0x2c/0x16b
Jan 30 07:30:47 Unraid kernel: do_mas_align_munmap.constprop.0+0xf2/0x3c6
Jan 30 07:30:47 Unraid kernel: __vm_munmap+0x9d/0xdd
Jan 30 07:30:47 Unraid kernel: elf_map+0xc1/0x115
Jan 30 07:30:47 Unraid kernel: load_elf_binary+0x8de/0x13ce
Jan 30 07:30:47 Unraid kernel: bprm_execve+0x23a/0x52b
Jan 30 07:30:47 Unraid kernel: do_execveat_common.isra.0+0x1a6/0x1cf
Jan 30 07:30:47 Unraid kernel: __x64_sys_execve+0x38/0x44
Jan 30 07:30:47 Unraid kernel: do_syscall_64+0x6b/0x81
Jan 30 07:30:47 Unraid kernel: entry_SYSCALL_64_after_hwframe+0x64/0xce
Jan 30 07:30:47 Unraid kernel: RIP: 0033:0x152bd9b09a87
Jan 30 07:30:47 Unraid kernel: Code: Unable to access opcode bytes at 0x152bd9b09a5d.
Jan 30 07:30:47 Unraid kernel: RSP: 002b:0000152bd5d9fe68 EFLAGS: 00000246 ORIG_RAX: 000000000000003b
Jan 30 07:30:47 Unraid kernel: RAX: ffffffffffffffda RBX: 00007ffc8a8949c0 RCX: 0000152bd9b09a87
Jan 30 07:30:47 Unraid kernel: RDX: 0000000001657da0 RSI: 00007ffc8a894ca0 RDI: 0000152bd9bd41af
Jan 30 07:30:47 Unraid kernel: RBP: 0000152bd5d9fff0 R08: 0000000000000000 R09: 0000000000000000
Jan 30 07:30:47 Unraid kernel: R10: 0000000000000008 R11: 0000000000000246 R12: 0000152bd9bd1a78
Jan 30 07:30:47 Unraid kernel: R13: 00007ffc8a894cc0 R14: 00000000018c64c0 R15: 0000000000000001
Jan 30 07:30:47 Unraid kernel: </TASK>
Jan 30 07:30:47 Unraid kernel: Modules linked in: xt_CHECKSUM ipt_REJECT nf_reject_ipv4 ip6table_mangle ip6table_nat iptable_mangle vhost_net tun vhost vhost_iotlb tap cmac cifs asn1_decoder cifs_arc4 cifs_md4 dns_resolver veth xt_nat xt_tcpudp xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype br_netfilter xfs nfsd auth_rpcgss oid_registry lockd grace sunrpc md_mod zfs(PO) zunicode(PO) zzstd(O) zlua(O) zavl(PO) icp(PO) zcommon(PO) znvpair(PO) spl(O) tcp_diag inet_diag it87(O) hwmon_vid ip6table_filter ip6_tables iptable_filter ip_tables x_tables bridge stp llc bonding tls amdgpu edac_mce_amd edac_core intel_rapl_msr intel_rapl_common iosf_mbi gpu_sched drm_buddy kvm_amd i2c_algo_bit drm_ttm_helper ttm drm_display_helper drm_kms_helper kvm drm crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel sha512_ssse3 sha256_ssse3 sha1_ssse3 wmi_bmof aesni_intel crypto_simd cryptd agpgart rapl i2c_piix4
Jan 30 07:30:47 Unraid kernel: nvme r8169 i2c_core k10temp ahci joydev input_leds nvme_core syscopyarea sysfillrect ccp led_class sysimgblt libahci fb_sys_fops realtek tpm_crb video tpm_tis tpm_tis_core wmi tpm backlight button acpi_cpufreq unix
Jan 30 07:30:47 Unraid kernel: ---[ end trace 0000000000000000 ]---
Jan 30 07:30:47 Unraid kernel: RIP: 0010:__rb_insert_augmented+0xb9/0x157
Jan 30 07:30:47 Unraid kernel: Code: 48 89 43 10 49 89 58 08 74 0a 48 89 da 48 83 ca 01 48 89 10 31 c9 4c 89 ea 4c 89 c6 e9 86 00 00 00 48 8b 43 10 48 85 c0 74 27 <f6> 00 01 75 22 48 89 da 48 83 ca 01 48 89 10 49 89 10 48 8b 03 48
Jan 30 07:30:47 Unraid kernel: RSP: 0018:ffffc90012107c90 EFLAGS: 00010286
Jan 30 07:30:47 Unraid kernel: RAX: cf00000000000000 RBX: ffff888f89af4bf8 RCX: ffff88817ec5ece8
Jan 30 07:30:47 Unraid kernel: RDX: ffffffff811d9645 RSI: ffff888f7a794148 RDI: ffff888f77676bf8
Jan 30 07:30:47 Unraid kernel: RBP: ffff888f77676bf8 R08: ffff888f7a794148 R09: 0000000000000000
Jan 30 07:30:47 Unraid kernel: R10: 0000000000000001 R11: ffff88814d7b1008 R12: ffffffff811d9645
Jan 30 07:30:47 Unraid kernel: R13: ffff888108691ff8 R14: ffff888f77676bd0 R15: ffff888108691fb0
Jan 30 07:30:47 Unraid kernel: FS:  0000000000000000(0000) GS:ffff888fee240000(0000) knlGS:0000000000000000
Jan 30 07:30:47 Unraid kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 30 07:30:47 Unraid kernel: CR2: 0000152bd9b09a5d CR3: 0000000f0cb66000 CR4: 0000000000750ee0
Jan 30 07:30:47 Unraid kernel: PKRU: 55555554
Jan 30 07:30:47 Unraid kernel: general protection fault, probably for non-canonical address 0x5a00000000000018: 0000 [#3] PREEMPT SMP NOPTI
Jan 30 07:30:47 Unraid kernel: CPU: 7 PID: 13817 Comm: sh Tainted: P      D    O       6.1.64-Unraid #1
Jan 30 07:30:47 Unraid kernel: Hardware name: ASUS System Product Name/TUF GAMING B450-PLUS II, BIOS 4402 12/13/2023
Jan 30 07:30:47 Unraid kernel: RIP: 0010:vma_interval_tree_augment_compute_max+0x1a/0x57
Jan 30 07:30:47 Unraid kernel: Code: 57 68 48 c1 e8 0c 48 8d 44 10 ff e9 0e 8b a2 00 41 54 41 89 f4 55 89 f5 53 48 89 fb e8 d6 ff ff ff 48 8b 53 38 48 85 d2 74 0b <48> 8b 52 18 48 39 d0 48 0f 42 c2 48 8b 53 30 48 85 d2 74 0b 48 8b
Jan 30 07:30:47 Unraid kernel: RSP: 0018:ffffc9001389fad0 EFLAGS: 00010206
Jan 30 07:30:47 Unraid kernel: RAX: 0000000000000035 RBX: ffff888f89ad4bd0 RCX: ffff888f6c131ad8
Jan 30 07:30:47 Unraid kernel: RDX: 5a00000000000000 RSI: 0000000000000001 RDI: ffff888f89ad4bd0
Jan 30 07:30:47 Unraid kernel: RBP: 0000000000000001 R08: ffff888f6c131ad8 R09: 0000000000000000
Jan 30 07:30:47 Unraid kernel: R10: 0000000000000001 R11: ffff88817f648d08 R12: 0000000000000001
Jan 30 07:30:47 Unraid kernel: R13: ffff88870a113a20 R14: 0000000000000000 R15: ffff888108685228
Jan 30 07:30:47 Unraid kernel: FS:  0000000000000000(0000) GS:ffff888fee3c0000(0000) knlGS:0000000000000000
Jan 30 07:30:47 Unraid kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 30 07:30:47 Unraid kernel: CR2: 0000000000530e68 CR3: 0000000f5f9cc000 CR4: 0000000000750ee0
Jan 30 07:30:47 Unraid kernel: PKRU: 55555554
Jan 30 07:30:47 Unraid kernel: Call Trace:
Jan 30 07:30:47 Unraid kernel: <TASK>
Jan 30 07:30:47 Unraid kernel: ? __die_body+0x1a/0x5c
Jan 30 07:30:47 Unraid kernel: ? die_addr+0x38/0x51
Jan 30 07:30:47 Unraid kernel: ? exc_general_protection+0x30f/0x345
Jan 30 07:30:47 Unraid kernel: ? asm_exc_general_protection+0x22/0x30
Jan 30 07:30:47 Unraid kernel: ? vma_interval_tree_augment_compute_max+0x1a/0x57
Jan 30 07:30:47 Unraid kernel: vma_interval_tree_augment_propagate+0x1b/0x2f
Jan 30 07:30:47 Unraid kernel: __vma_adjust+0x3a2/0x7b1
Jan 30 07:30:47 Unraid kernel: __split_vma+0x105/0x16b
Jan 30 07:30:47 Unraid kernel: do_mas_align_munmap.constprop.0+0xf2/0x3c6
Jan 30 07:30:47 Unraid kernel: __vm_munmap+0x9d/0xdd
Jan 30 07:30:47 Unraid kernel: elf_map+0xc1/0x115
Jan 30 07:30:47 Unraid kernel: load_elf_binary+0x8de/0x13ce
Jan 30 07:30:47 Unraid kernel: bprm_execve+0x23a/0x52b
Jan 30 07:30:47 Unraid kernel: do_execveat_common.isra.0+0x1a6/0x1cf
Jan 30 07:30:47 Unraid kernel: __x64_sys_execve+0x38/0x44
Jan 30 07:30:47 Unraid kernel: do_syscall_64+0x6b/0x81
Jan 30 07:30:47 Unraid kernel: entry_SYSCALL_64_after_hwframe+0x64/0xce
Jan 30 07:30:47 Unraid kernel: RIP: 0033:0x146dae044a87
Jan 30 07:30:47 Unraid kernel: Code: Unable to access opcode bytes at 0x146dae044a5d.
Jan 30 07:30:47 Unraid kernel: RSP: 002b:0000146daa2dae68 EFLAGS: 00000246 ORIG_RAX: 000000000000003b
Jan 30 07:30:47 Unraid kernel: RAX: ffffffffffffffda RBX: 00007ffde26f7fd0 RCX: 0000146dae044a87
Jan 30 07:30:47 Unraid kernel: RDX: 0000000001657da0 RSI: 00007ffde26f82b0 RDI: 0000146dae10f1af
Jan 30 07:30:47 Unraid kernel: RBP: 0000146daa2daff0 R08: 0000000000000000 R09: 0000000000000000
Jan 30 07:30:47 Unraid kernel: R10: 0000000000000008 R11: 0000000000000246 R12: 0000146dae10ca78
Jan 30 07:30:47 Unraid kernel: R13: 00007ffde26f82d0 R14: 00000000018c0d20 R15: 0000000000000001

(....)

unraid-diagnostics-20240130-0747.zip

Link to comment

Hi, 

 

Yes, just finished and it has reported back faults "en mass"... 😞

 

I am now running memory test on of the two bars in order identify the faulty one.

 

Thanks for the help!

 

BR

Lars

Edited by SpeedyB
Link to comment

I am having this issue as well on 6.12.6   And yes, I have run  memtest.   all 256 GB of ECC memory tests just fine.

In my case, the losf "fault" immediately precedes my 10 NIC loosing link temporarily, which kills all my transfers, so this is causing me a tremendous amount of grief.

 

Can we please get some kind of official attention on this? (more than another canned "have you run memtest?" response, please)

 

It is affecting far too many people across too many versions and for far too long to be any one person's issue... there is clearly a problem here that needs to be addressed.

 

 

Link to comment

hmm im getting 

Feb  4 15:31:13 Unraid-Server kernel: traps: lsof[9355] general protection fault ip:14a86c037c6e sp:f82cd84126b6b03b error:0 in libc-2.37.so[14a86c01f000+169000]
Feb  4 15:39:34 Unraid-Server kernel: traps: lsof[6297] general protection fault ip:14881de10c6e sp:79d5a8ef6d1aeb51 error:0 in libc-2.37.so[14881ddf8000+169000]

 

everytime i try to delete something within plex (like click media info, and click delete file something.mp4), the circle spins and after a long time, it gets successfully deleted... anyone else n oticed this?

 

Ive tried it now 3 or 4 times, same thing happend, some files work without a problem tho.

interestingly is this error appears in the second the remove is successfull?

 

edit: tryd running "lsof" in terminal, getting more of those errors..?

Edited by NewDisplayName
Link to comment
  • 2 weeks later...
  • 3 weeks later...

Was there a consensus on the cause of these from all these people here ?

I get two half way through parity check :

 

Mar 15 10:09:49 Tower kernel: traps: lsof[5765] general protection fault ip:14c84ce0ec6e sp:9b917bd0db55c780 error:0 in libc-2.37.so[14c84cdf6000+169000]

Mar 15 12:40:09 Tower kernel: traps: lsof[25961] general protection fault ip:147649689c6e sp:ef64b13a79b916f4 error:0 in libc-2.37.so[147649671000+169000]

 

Memtest was clear.

No lockups at this stage.

Link to comment
  • 2 weeks later...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.