Hi, Thank you for your report. It's known that memcg/thp has problems, and KAMEZAWA-san has already sent patches to fix them(I think they will be pushed to Linus in near future). Please wait for a while, or can you try patches: https://patchwork.kernel.org/patch/484921/ https://patchwork.kernel.org/patch/484931/ https://patchwork.kernel.org/patch/484941/ https://patchwork.kernel.org/patch/484951/ ? Thanks, Daisuke Nishimura. On Thu, 20 Jan 2011 00:55:30 -0500 (EST) CAI Qian <caiqian@xxxxxxxxxx> wrote: > When running LTP ksm03 test [1], kernel is dead. > > # ksm03 -u 128 > > WARNING: at kernel/res_counter.c:71 res_counter_uncharge_locked+0x37/0x40() > Hardware name: QSSC-S4R > Modules linked in: autofs4 sunrpc cpufreq_ondemand acpi_cpufreq freq_table mperf ipv6 dm_mirror dm_region_hash dm_log bnx2 pcspkr i2c_i801 i2c_core iTCO_wdt iTCO_vendor_support ioatdma i7core_edac edac_core shpchp sg igb dca ext4 mbcache jbd2 sr_mod cdrom sd_mod crc_t10dif pata_acpi ata_generic ata_piix megaraid_sas dm_mod [last unloaded: microcode] > Pid: 278, comm: ksmd Tainted: G W 2.6.38-rc1 #1 > Call Trace: > [<ffffffff81061f8f>] ? warn_slowpath_common+0x7f/0xc0 > [<ffffffff81061fea>] ? warn_slowpath_null+0x1a/0x20 > [<ffffffff810b4fb7>] ? res_counter_uncharge_locked+0x37/0x40 > [<ffffffff810b5004>] ? res_counter_uncharge+0x44/0x70 > [<ffffffff8114db15>] ? __mem_cgroup_uncharge_common+0x265/0x2c0 > [<ffffffff8114dbbf>] ? mem_cgroup_uncharge_page+0x2f/0x40 > [<ffffffff81126a2d>] ? page_remove_rmap+0x3d/0xb0 > [<ffffffff8113d88f>] ? try_to_merge_with_ksm_page+0x53f/0x5e0 > [<ffffffff8113e4f8>] ? ksm_scan_thread+0x5f8/0xd10 > [<ffffffff810836e0>] ? autoremove_wake_function+0x0/0x40 > [<ffffffff8113df00>] ? ksm_scan_thread+0x0/0xd10 > [<ffffffff81083046>] ? kthread+0x96/0xa0 > [<ffffffff8100cdc4>] ? kernel_thread_helper+0x4/0x10 > [<ffffffff81082fb0>] ? kthread+0x0/0xa0 > [<ffffffff8100cdc0>] ? kernel_thread_helper+0x0/0x10 > ---[ end trace f600950ce87dbdf9 ]--- > BUG: unable to handle kernel paging request at ffffc900171d3090 > IP: [<ffffffff8114a92e>] mem_cgroup_get_reclaim_stat_from_page+0x4e/0x80 > PGD 87f419067 PUD c7f419067 PMD 85e8bd067 PTE 0 > Oops: 0000 [#1] SMP > last sysfs file: /sys/kernel/mm/ksm/run > CPU 0 > Modules linked in: autofs4 sunrpc cpufreq_ondemand acpi_cpufreq freq_table mperf ipv6 dm_mirror dm_region_hash dm_log bnx2 pcspkr i2c_i801 i2c_core iTCO_wdt iTCO_vendor_support ioatdma i7core_edac edac_core shpchp sg igb dca ext4 mbcache jbd2 sr_mod cdrom sd_mod crc_t10dif pata_acpi ata_generic ata_piix megaraid_sas dm_mod [last unloaded: microcode] > > Pid: 7297, comm: ksm03 Tainted: G W 2.6.38-rc1 #1 QSSC-S4R/QSSC-S4R > RIP: 0010:[<ffffffff8114a92e>] [<ffffffff8114a92e>] mem_cgroup_get_reclaim_stat_from_page+0x4e/0x80 > RSP: 0018:ffff88105da05b58 EFLAGS: 00010002 > RAX: 0000000000000002 RBX: ffff88047ffd9e00 RCX: 0000000000000000 > RDX: ffffc900171d3000 RSI: ffffea000eb84c00 RDI: 0000000000434a80 > RBP: ffff88105da05b58 R08: ffff8804620ba3c8 R09: 0000000000000040 > R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 > R13: 0000000000000001 R14: 0000000000000490 R15: ffff880078211c00 > FS: 00007fd0f1214700(0000) GS:ffff880078200000(0000) knlGS:0000000000000000 > CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b > CR2: ffffc900171d3090 CR3: 000000085d872000 CR4: 00000000000006f0 > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 > Process ksm03 (pid: 7297, threadinfo ffff88105da04000, task ffff88105ea82100) > Stack: > ffff88105da05b88 ffffffff81104b1d ffff88105da05b88 ffffea000eb84c00 > ffff88047ffd9e00 000000000000000a ffff88105da05bd8 ffffffff8110562e > 0000000200000000 0000000100000001 ffff88105da05bc8 ffffea000eb84ca8 > Call Trace: > [<ffffffff81104b1d>] update_page_reclaim_stat+0x2d/0x70 > [<ffffffff8110562e>] ____pagevec_lru_add+0xee/0x190 > [<ffffffff81105728>] __lru_cache_add+0x58/0x70 > [<ffffffff8110576d>] lru_cache_add_lru+0x2d/0x50 > [<ffffffff81127a5d>] page_add_new_anon_rmap+0x9d/0xf0 > [<ffffffff8111cc44>] do_wp_page+0x294/0x910 > [<ffffffff8111ec1d>] handle_pte_fault+0x2ad/0xb20 > [<ffffffff8111f641>] handle_mm_fault+0x1b1/0x320 > [<ffffffff8113c854>] break_ksm+0x74/0xa0 > [<ffffffff8113dd7d>] run_store+0x19d/0x320 > [<ffffffff812275c7>] kobj_attr_store+0x17/0x20 > [<ffffffff811be67f>] sysfs_write_file+0xef/0x170 > [<ffffffff81153fd8>] vfs_write+0xc8/0x190 > [<ffffffff811541a1>] sys_write+0x51/0x90 > [<ffffffff8100bf82>] system_call_fastpath+0x16/0x1b > Code: c0 c9 c3 66 2e 0f 1f 84 00 00 00 00 00 48 8b 50 08 48 8b 40 10 48 85 d2 48 8b 00 74 e2 48 89 c1 48 c1 e8 34 48 c1 e9 36 83 e0 03 <48> 8b 94 ca 90 00 00 00 48 89 c1 48 c1 e0 08 48 c1 e1 04 48 29 > RIP [<ffffffff8114a92e>] mem_cgroup_get_reclaim_stat_from_page+0x4e/0x80 > RSP <ffff88105da05b58> > CR2: ffffc900171d3090 > ---[ end trace f600950ce87dbdfa ]--- > > [1] http://ltp.git.sourceforge.net/git/gitweb.cgi?p=ltp/ltp.git;a=blob;f=testcases/kernel/mem/ksm/ksm03.c > -- > To unsubscribe from this list: send the line "unsubscribe linux-kernel" in > the body of a message to majordomo@xxxxxxxxxxxxxxx > More majordomo info at http://vger.kernel.org/majordomo-info.html > Please read the FAQ at http://www.tux.org/lkml/ -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@xxxxxxxxxx For more info on Linux MM, see: http://www.linux-mm.org/ . Fight unfair telecom policy in Canada: sign http://dissolvethecrtc.ca/ Don't email: <a href=mailto:"dont@xxxxxxxxx"> email@xxxxxxxxx </a>