Re: [Bugme-new] [Bug 39632] New: kernel BUG at arch/x86/mm/fault.c:395

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



(switched to email.  Please respond via emailed reply-to-all, not via the
bugzilla web interface).

On Wed, 20 Jul 2011 15:25:32 GMT
bugzilla-daemon@xxxxxxxxxxxxxxxxxxx wrote:

> https://bugzilla.kernel.org/show_bug.cgi?id=39632
> 
>            Summary: kernel BUG at arch/x86/mm/fault.c:395
>            Product: Memory Management
>            Version: 2.5
>     Kernel Version: 3.0.0-RC7
>           Platform: All
>         OS/Version: Linux
>               Tree: Mainline
>             Status: NEW
>           Severity: normal
>           Priority: P1
>          Component: Other
>         AssignedTo: akpm@xxxxxxxxxxxxxxxxxxxx
>         ReportedBy: greenhostnl@xxxxxxxxx
>         Regression: No

I think this is a plain old oops in mem_cgroup_charge_statistics(), but
for some reason it's treating the oopsing address as part of the
vmalloc arena.  Perhaps this is what a use-after-free looks like on the
new percpu area implementation?


> 
> This bug is triggered when the cgroup oom-killer is invoked and kills a child
> process in the cgroups hierarchy. It does not happen every time, but sometimes.
> The immediate result is a process hanging in the 'D' state.
> 
> The machine is AMD 64, kernel 3.0.0rc7, running as a paravirtualised Xen guest.
> Cgroups are configured. CONFIG_CGROUP_MEM_RES_CTLR=y (swap not used).
> 
> This kernel has been patched with Daniel Kiper's XEN memory-hotplug-ballooning
> patchset, queued for Linux 3.1, otherwise vanilla. I am unable to determine how
> relevant the patchset is to this problem.
> 
> Bug output follows:
> 
> [426900.196014] Memory cgroup out of memory: Kill process 22433 (php-cgi) score
> 924 or sacrifice child
> [426900.196014] Killed process 22433 (php-cgi) total-vm:289680kB,
> anon-rss:134272kB, file-rss:7136kB
> [426900.218250] ------------[ cut here ]------------
> [426900.218262] kernel BUG at arch/x86/mm/fault.c:395!
> [426900.218268] invalid opcode: 0000 [#1] SMP
> [426900.218276] CPU 0
> [426900.218279] Modules linked in: ipv6 evdev pcspkr xfs exportfs dm_mirror
> dm_region_hash dm_log dm_snapshot dm_mod
> [426900.218307]
> [426900.218312] Pid: 22433, comm: php-cgi Not tainted 3.0.0-rc7+ #1
> [426900.218323] RIP: e030:[<ffffffff8135854a>]  [<ffffffff8135854a>]
> vmalloc_fault+0x15a/0x2a0
> [426900.218339] RSP: e02b:ffff8800a53b38c8  EFLAGS: 00010046
> [426900.218345] RAX: 00000000c5cc2000 RBX: ffffe8fffff994e0 RCX:
> ffff880000000ff8
> [426900.218352] RDX: 0000000000000000 RSI: ffff8800c5cc2ff8 RDI:
> 0000000000000000
> [426900.218359] RBP: ffff88003c167e88 R08: 00003ffffffff000 R09:
> ffffffff81505880
> [426900.218367] R10: ffff880000000000 R11: dead000000200200 R12:
> ffffffff814cde88
> [426900.218372] R13: ffff8800a53b39f8 R14: 0000000000000029 R15:
> 0000000000000000
> [426900.218386] FS:  00007ff0228a8720(0000) GS:ffff88003fd61000(0000)
> knlGS:0000000000000000
> [426900.218393] CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
> [426900.218399] CR2: ffffe8fffff994e0 CR3: 000000003c167000 CR4:
> 0000000000000660
> [426900.218407] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
> 0000000000000000
> [426900.218415] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7:
> 0000000000000400
> [426900.218423] Process php-cgi (pid: 22433, threadinfo ffff8800a53b2000, task
> ffff8800bf556aa0)
> [426900.218432] Stack:
> [426900.218436]  ffff8800a53b3fd8 0000000000000001 ffffe8fffff994e0
> 0000000000000002
> [426900.218453]  ffff8800a53b39f8 ffffffff81358bd9 0000000000000060
> ffff8800bf556aa0
> [426900.218467]  ffff88003c2fd180 0000000000000002 0000000000000000
> 0000000200020200
> [426900.218483] Call Trace:
> [426900.218491]  [<ffffffff81358bd9>] ? do_page_fault+0x339/0x4e0
> [426900.218501]  [<ffffffff810b0d64>] ? __alloc_pages_nodemask+0x144/0x860
> [426900.218510]  [<ffffffff81355915>] ? page_fault+0x25/0x30
> [426900.218519]  [<ffffffff810df69a>] ? mem_cgroup_charge_statistics+0x3a/0x60
> [426900.218594]  [<ffffffff810e241d>] ? __mem_cgroup_uncharge_common+0xcd/0x1f0
> [426900.218604]  [<ffffffff810d0068>] ? page_remove_rmap+0x38/0x60
> [426900.218613]  [<ffffffff810c907b>] ? unmap_vmas+0x60b/0x8f0
> [426900.218622]  [<ffffffff810cb608>] ? exit_mmap+0x78/0x110
> [426900.218632]  [<ffffffff81041475>] ? mmput+0x25/0xe0
> [426900.218640]  [<ffffffff81045b45>] ? exit_mm+0x125/0x160
> [426900.218647]  [<ffffffff8104780b>] ? do_exit+0x16b/0x870
> [426900.218655]  [<ffffffff81047f4f>] ? do_group_exit+0x3f/0xb0
> [426900.218667]  [<ffffffff8105524d>] ? get_signal_to_deliver+0x1dd/0x400
> [426900.218676]  [<ffffffff8100a8cd>] ? __switch_to+0x26d/0x350
> [426900.218684]  [<ffffffff8100b360>] ? do_notify_resume+0x100/0x7f0
> [426900.218693]  [<ffffffff810e7b31>] ? vfs_read+0x161/0x180
> [426900.218700]  [<ffffffff8135575c>] ? retint_signal+0x48/0x8c
> [426900.218706] Code: 39 48 85 ff 74 25 ff 14 25 40 99 4d 81 48 89 c2 48 8b 3e
> ff 14 25 40 99 4d 81 4c 21 c2 4c 21 c0 4c 01 d2 4c 01 d0 48 39 c2 74 41 <0f> 0b
> eb fe 0f 0b eb fe 48 89 ef e8 66 d8 ca ff 66 90 e9 67 ff
> [426900.218826] RIP  [<ffffffff8135854a>] vmalloc_fault+0x15a/0x2a0
> [426900.218835]  RSP <ffff8800a53b38c8>
> [426900.218844] ---[ end trace 20f6f5477696edd2 ]---
> [426900.218850] Fixing recursive fault but reboot is needed!
> 

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@xxxxxxxxx.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Fight unfair telecom internet charges in Canada: sign http://stopthemeter.ca/
Don't email: <a href=mailto:"dont@xxxxxxxxx";> email@xxxxxxxxx </a>


[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]