[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <54D402BA.2030307@oracle.com>
Date: Thu, 05 Feb 2015 15:54:34 -0800
From: santosh shilimkar <santosh.shilimkar@...cle.com>
To: Tejun Heo <tj@...nel.org>, Li Zefan <lizefan@...wei.com>,
cgroups@...r.kernel.org
CC: "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: [BUG in v3.18 ?] Seems to be triggered from cgroup code
Hi Tejun and all,
We observed a BUG (stack is end of the email) while trying do some
ceph testing. I looked at pidlist_free(), pidlist_array_load() for
any potential leak but those functions looked fine to me.
The BUG is not 100% reproducible either so though of reporting
to the list to get some more pointers.
Thanks in advance !!
Regards,
Santosh
------------[ cut here ]------------
kernel BUG at mm/slub.c:3334!
invalid opcode: 0000 [#1] SMP
Modules linked in: nls_utf8 isofs loop xt_CHECKSUM iptable_mangle
ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat
nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT
nf_reject_ipv4 iptable_filter ip_tables tun bridge stp llc drbd
lru_cache intel_powerclamp coretemp kvm_intel kvm crct10dif_pclmul
crc32_pclmul crc32c_intel ghash_clmulni_intel aesni_intel iTCO_wdt
iTCO_vendor_support lrw gf128mul glue_helper ablk_helper cryptd
i7core_edac lpc_ich ipmi_si i2c_i801 mfd_core edac_core ioatdma pcspkr
shpchp ipmi_msghandler acpi_cpufreq binfmt_misc xfs libcrc32c ast
syscopyarea sr_mod sysfillrect sysimgblt cdrom drm_kms_helper ixgbe mdio
ttm ahci sd_mod igb uas libahci e1000e dca ptp libata drm usb_storage
i2c_algo_bit megaraid_sas pps_core i2c_core dm_mirror
dm_region_hash dm_log dm_mod
CPU: 11 PID: 1 Comm: systemd Tainted: G W
3.18.4-5.el7uek.x86_64 #1
Hardware name: Oracle Corporation SUN FIRE X4170 M2 SERVER
/ASSY,MOTHERBOARD,X4170, BIOS 08120104 05/08/2012
task: ffff88065d218000 ti: ffff88065d214000 task.ti: ffff88065d214000
RIP: 0010:[<ffffffff811d1463>] [<ffffffff811d1463>] kfree+0x133/0x140
RSP: 0018:ffff88065d217cc8 EFLAGS: 00010246
RAX: 002fffff80000000 RBX: ffff8806000009a3 RCX: ffff88065460fbe0
RDX: 002fffff80000000 RSI: 0000000000000000 RDI: ffff8806000009a3
RBP: ffff88065d217ce8 R08: 0000000000000000 R09: ffffffff8110a91f
R10: ffffea0018000000 R11: 0000000000000246 R12: 0000000000000001
R13: ffffffff81105c3a R14: ffff880654735070 R15: ffff880654671400
FS: 00007f0e47f19880(0000) GS:ffff88067e960000(0000)
knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f0e47f28000 CR3: 0000000655a40000 CR4: 00000000000007e0
0000000000000000 ffff88065460fbc0 0000000000000001 0000000000000000
Stack:
ffff88065d217cf8 ffffffff81105c3a ffff88065d217d88 ffffffff8110a9ff
ffff88065d217dc4 ffff88065ccdb390 ffff88065867fb50 0000000000000000
Call Trace:
[<ffffffff81105c3a>] pidlist_free+0x2a/0x40
[<ffffffff8110a9ff>] pidlist_array_load+0x17f/0x350
[<ffffffff811048fd>] cgroup_seqfile_start+0x1d/0x20
[<ffffffff8110ad47>] cgroup_pidlist_start+0x177/0x1d0
[<ffffffff81269e32>] kernfs_seq_start+0x52/0xa0
[<ffffffff81215ce7>] seq_read+0x177/0x3a0
[<ffffffff8126a4e5>] kernfs_fop_read+0xf5/0x160
[<ffffffff811f139c>] vfs_read+0x9c/0x180
[<ffffffff811f1f55>] SyS_read+0x55/0xd0
[<ffffffff816bfb29>] system_call_fastpath+0x12/0x17
Code: 49 8b 02 31 f6 f6 c4 40 74 04 41 8b 72 68 4c 89 d7 e8 f2 e5 fa
ff eb 93 4c 8b 50 30 48 8b 10 80 e6 80 4c 0f 44 d0 e9 36 ff ff ff <0f>
0b 66 66 2e 0f 1f 84 00 00 00 00 00 66 66 66 66 90 55 48 89
RIP [<ffffffff811d1463>] kfree+0x133/0x140
RSP <ffff88065d217cc8>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists