Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758582Ab1DYML3 (ORCPT ); Mon, 25 Apr 2011 08:11:29 -0400 Received: from legolas.restena.lu ([158.64.1.34]:59834 "EHLO legolas.restena.lu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1758526Ab1DYML1 convert rfc822-to-8bit (ORCPT ); Mon, 25 Apr 2011 08:11:27 -0400 Date: Mon, 25 Apr 2011 14:11:14 +0200 From: Bruno =?UTF-8?B?UHLDqW1vbnQ=?= To: Pekka Enberg Cc: Mike Frysinger , KOSAKI Motohiro , linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-fsdevel@vger.kernel.org, Catalin Marinas , Alexey Dobriyan , Linus Torvalds , Al Viro , Nick Piggin Subject: Re: 2.6.39-rc4+: Kernel leaking memory during FS scanning, regression? Message-ID: <20110425141114.73539b2c@neptune.home> In-Reply-To: References: <20110424202158.45578f31@neptune.home> <20110424235928.71af51e0@neptune.home> <20110425114429.266A.A69D9226@jp.fujitsu.com> <20110425111705.786ef0c5@neptune.home> <20110425123444.639aad34@neptune.home> <20110425134145.048f7cc1@neptune.home> X-Mailer: Claws Mail 3.7.8 (GTK+ 2.22.1; i686-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 11891 Lines: 203 On Mon, 25 April 2011 Pekka Enberg wrote: > On Mon, Apr 25, 2011 at 2:41 PM, Bruno Prémont wrote: > >> Hm, seems not to be willing to let me run kmemleak... each time I put > >> on my load scenario I get "BUG: unable to handle kernel " on console > >> as a last breath from the system. (the rest of the trace never shows up) > >> > >> Going to try harder to get at least a complete trace... > > > > After many attempts I got something from kmemleak (running on VESAfb > > instead of vgacon or nouveau KMS), netconsole disabled. > > For the crashes my screen is just too small to display the interesting > > part of it (maybe I can get it via serial console at a later attempt) > > ... > Btw, did you manage to grab any kmemleak related crashes? It > would be good to get them fixed as well. (after plugging in serial cable and hooking it to minicom) With serial console I got the crash (unless more are waiting behind): [ 290.477295] cc1 used greatest stack depth: 4972 bytes left [ 304.476261] cc1plus used greatest stack depth: 4916 bytes left [ 314.573703] BUG: unable to handle kernel NULL pointer dereference at 00000001 [ 314.580013] IP: [] kmem_cache_alloc+0x4a/0x120 [ 314.580013] *pde = 00000000 [ 314.580013] Oops: 0000 [#1] [ 314.580013] last sysfs file: /sys/devices/platform/w83627hf.656/temp3_input [ 314.580013] Modules linked in: squashfs zlib_inflate nfs lockd nfs_acl sunrpc snd_intel8x0 snd_ac97_codec ac97_bus snd_pcm snd_timer snd pcspkr snd_page_alloc [ 314.580013] [ 314.580013] Pid: 2119, comm: configure Tainted: G W 2.6.39-rc4-jupiter-00187-g686c4cb #3 NVIDIA Corporation. nFORCE-MCP/MS-6373 [ 314.580013] EIP: 0060:[] EFLAGS: 00210246 CPU: 0 [ 314.580013] EIP is at kmem_cache_alloc+0x4a/0x120 [ 314.580013] EAX: ddc25718 EBX: dd406100 ECX: c10b75f9 EDX: 00000000 [ 314.580013] ESI: 00000001 EDI: 000112d0 EBP: db1ebe34 ESP: db1ebe08 [ 314.580013] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 0068 [ 314.580013] Process configure (pid: 2119, ti=db1ea000 task=db144d00 task.ti=db1ea000) [ 314.580013] Stack: [ 314.580013] dc688510 c6df1690 c6df16a4 c10b75f9 db1ebe4c 00200286 00000000 001aa464 [ 314.580013] 000000d0 00000001 db31a738 db1ebe68 c10b75f9 00000000 000000d0 dc688510 [ 314.580013] 00000010 db1ebe5c c138aae7 000000d0 dd406280 000000d0 db31a738 000000d0 [ 314.580013] Call Trace: [ 314.580013] [] ? create_object+0x29/0x210 [ 314.580013] [] create_object+0x29/0x210 [ 314.580013] [] ? kmemleak_alloc+0x27/0x50 [ 314.580013] [] kmemleak_alloc+0x27/0x50 [ 314.580013] [] kmem_cache_alloc+0x88/0x120 [ 314.580013] [] ? anon_vma_fork+0x50/0xe0 [ 314.580013] [] ? anon_vma_clone+0x82/0xb0 [ 314.580013] [] anon_vma_fork+0x50/0xe0 [ 314.580013] [] dup_mm+0x1d1/0x440 [ 314.580013] [] copy_process+0x98d/0xcc0 [ 314.580013] [] do_fork+0x57/0x2e0 [ 314.580013] [] ? copy_to_user+0x34/0x130 [ 314.580013] [] ? copy_to_user+0x34/0x130 [ 314.580013] [] sys_clone+0x2f/0x40 [ 314.580013] [] ptregs_clone+0x15/0x38 [ 314.580013] [] ? sysenter_do_call+0x12/0x26 [ 314.580013] Code: 0f 85 8b 00 00 00 8b 03 8b 50 04 89 55 f0 8b 30 85 f6 0f 84 97 00 00 00 8b 03 8b 10 39 d6 75 e8 8b 50 04 39 55 f0 75 e0 8b 53 14 <8b> 14 16 89 10 8b 55 f0 8b 03 42 89 50 04 85 f6 89 f8 0f 95 c2 [ 314.580013] EIP: [] kmem_cache_alloc+0x4a/0x120 SS:ESP 0068:db1ebe08 [ 314.580013] CR2: 0000000000000001 [ 315.060947] BUG: unable to handle kernel NULL pointer dereference at 00000001 [ 315.070927] IP: [] kmem_cache_alloc+0x4a/0x120 [ 315.070927] *pde = 00000000 [ 315.070927] Oops: 0000 [#2] [ 315.070927] last sysfs file: /sys/devices/platform/w83627hf.656/temp3_input [ 315.070927] Modules linked in: squashfs zlib_inflate nfs lockd nfs_acl sunrpc snd_intel8x0 snd_ac97_codec ac97_bus snd_pcm snd_timer snd pcspkr snd_page_alloc [ 315.070927] [ 315.070927] Pid: 2119, comm: configure Tainted: G D W 2.6.39-rc4-jupiter-00187-g686c4cb #3 NVIDIA Corporation. nFORCE-MCP/MS-6373 [ 315.070927] EIP: 0060:[] EFLAGS: 00210046 CPU: 0 [ 315.070927] EIP is at kmem_cache_alloc+0x4a/0x120 [ 315.070927] EAX: ddc25718 EBX: dd406100 ECX: c10b75f9 EDX: 00000000 [ 315.070927] ESI: 00000001 EDI: 00011220 EBP: db1ebad0 ESP: db1ebaa4 [ 315.070927] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 0068 [ 315.070927] Process configure (pid: 2119, ti=db1ea000 task=db144d00 task.ti=db1ea000) [ 315.070927] Stack: [ 315.070927] 1d424de4 00000048 0060a459 00000000 49e0f2ff 00000007 0000000e 001aa464 [ 315.070927] 00000020 00000001 dc5d8630 db1ebb04 c10b75f9 00a8b6a4 00000000 69e595ce [ 315.070927] 00000090 db144d00 db4248a0 db1ebb14 c1025d9f 00000020 dc5d8630 00000020 [ 315.070927] Call Trace: [ 315.070927] [] create_object+0x29/0x210 [ 315.070927] [] ? check_preempt_wakeup+0xcf/0x160 [ 315.070927] [] kmemleak_alloc+0x27/0x50 [ 315.070927] [] kmem_cache_alloc+0x88/0x120 [ 315.070927] [] __sigqueue_alloc+0x45/0xc0 [ 315.070927] [] T.792+0x9d/0x290 [ 315.070927] [] do_send_sig_info+0x44/0x60 [ 315.070927] [] group_send_sig_info+0x3a/0x50 [ 315.070927] [] kill_pid_info+0x2f/0x50 [ 315.070927] [] it_real_fn+0x33/0x80 [ 315.070927] [] ? alarm_setitimer+0x60/0x60 [ 315.070927] [] __run_hrtimer+0x64/0x1a0 [ 315.070927] [] ? ktime_get+0x55/0xf0 [ 315.070927] [] hrtimer_interrupt+0x115/0x250 [ 315.070927] [] ? sched_clock_cpu+0x95/0x110 [ 315.070927] [] smp_apic_timer_interrupt+0x41/0x80 [ 315.070927] [] apic_timer_interrupt+0x2a/0x30 [ 315.070927] [] ? oops_end+0x4a/0xb0 [ 315.070927] [] no_context+0xbe/0x150 [ 315.070927] [] __bad_area_nosemaphore+0x8f/0x130 [ 315.070927] [] ? __alloc_pages_nodemask+0xdd/0x730 [ 315.070927] [] ? search_module_extables+0x62/0x80 [ 315.070927] [] bad_area_nosemaphore+0x12/0x20 [ 315.070927] [] do_page_fault+0x2f1/0x3d0 [ 315.070927] [] ? __module_text_address+0xb/0x50 [ 315.070927] [] ? is_module_text_address+0x8/0x10 [ 315.070927] [] ? __kernel_text_address+0x47/0x70 [ 315.070927] [] ? print_context_stack+0x41/0xb0 [ 315.070927] [] ? vmalloc_sync_all+0x100/0x100 [ 315.070927] [] error_code+0x58/0x60 [ 315.070927] [] ? create_object+0x29/0x210 [ 315.070927] [] ? vmalloc_sync_all+0x100/0x100 [ 315.070927] [] ? kmem_cache_alloc+0x4a/0x120 [ 315.070927] [] ? create_object+0x29/0x210 [ 315.070927] [] create_object+0x29/0x210 [ 315.070927] [] ? kmemleak_alloc+0x27/0x50 [ 315.070927] [] kmemleak_alloc+0x27/0x50 [ 315.070927] [] kmem_cache_alloc+0x88/0x120 [ 315.070927] [] ? anon_vma_fork+0x50/0xe0 [ 315.070927] [] ? anon_vma_clone+0x82/0xb0 [ 315.070927] [] anon_vma_fork+0x50/0xe0 [ 315.070927] [] dup_mm+0x1d1/0x440 [ 315.070927] [] copy_process+0x98d/0xcc0 [ 315.070927] [] do_fork+0x57/0x2e0 [ 315.070927] [] ? copy_to_user+0x34/0x130 [ 315.070927] [] ? copy_to_user+0x34/0x130 [ 315.070927] [] sys_clone+0x2f/0x40 [ 315.070927] [] ptregs_clone+0x15/0x38 [ 315.070927] [] ? sysenter_do_call+0x12/0x26 [ 315.070927] Code: 0f 85 8b 00 00 00 8b 03 8b 50 04 89 55 f0 8b 30 85 f6 0f 84 97 00 00 00 8b 03 8b 10 39 d6 75 e8 8b 50 04 39 55 f0 75 e0 8b 53 14 <8b> 14 16 89 10 8b 55 f0 8b 03 42 89 50 04 85 f6 89 f8 0f 95 c2 [ 315.070927] EIP: [] kmem_cache_alloc+0x4a/0x120 SS:ESP 0068:db1ebaa4 [ 315.070927] CR2: 0000000000000001 [ 315.070927] ---[ end trace 009f60096033f2b2 ]--- [ 315.070927] Kernel panic - not syncing: Fatal exception in interrupt [ 315.070927] Pid: 2119, comm: configure Tainted: G D W 2.6.39-rc4-jupiter-00187-g686c4cb #3 [ 315.070927] Call Trace: [ 315.070927] [] panic+0x57/0x14c [ 315.070927] [] oops_end+0xab/0xb0 [ 315.070927] [] no_context+0xbe/0x150 [ 315.070927] [] __bad_area_nosemaphore+0x8f/0x130 [ 315.070927] [] bad_area_nosemaphore+0x12/0x20 [ 315.070927] [] do_page_fault+0x254/0x3d0 [ 315.070927] [] ? bit_putcs+0x2a2/0x430 [ 315.070927] [] ? vmalloc_sync_all+0x100/0x100 [ 315.070927] [] error_code+0x58/0x60 [ 315.070927] [] ? create_object+0x29/0x210 [ 315.070927] [] ? vmalloc_sync_all+0x100/0x100 [ 315.070927] [] ? kmem_cache_alloc+0x4a/0x120 [ 315.070927] [] create_object+0x29/0x210 [ 315.070927] [] ? check_preempt_wakeup+0xcf/0x160 [ 315.070927] [] kmemleak_alloc+0x27/0x50 [ 315.070927] [] kmem_cache_alloc+0x88/0x120 [ 315.070927] [] __sigqueue_alloc+0x45/0xc0 [ 315.070927] [] T.792+0x9d/0x290 [ 315.070927] [] do_send_sig_info+0x44/0x60 [ 315.070927] [] group_send_sig_info+0x3a/0x50 [ 315.070927] [] kill_pid_info+0x2f/0x50 [ 315.070927] [] it_real_fn+0x33/0x80 [ 315.070927] [] ? alarm_setitimer+0x60/0x60 [ 315.070927] [] __run_hrtimer+0x64/0x1a0 [ 315.070927] [] ? ktime_get+0x55/0xf0 [ 315.070927] [] hrtimer_interrupt+0x115/0x250 [ 315.070927] [] ? sched_clock_cpu+0x95/0x110 [ 315.070927] [] smp_apic_timer_interrupt+0x41/0x80 [ 315.070927] [] apic_timer_interrupt+0x2a/0x30 [ 315.070927] [] ? oops_end+0x4a/0xb0 [ 315.070927] [] no_context+0xbe/0x150 [ 315.070927] [] __bad_area_nosemaphore+0x8f/0x130 [ 315.070927] [] ? __alloc_pages_nodemask+0xdd/0x730 [ 315.070927] [] ? search_module_extables+0x62/0x80 [ 315.070927] [] bad_area_nosemaphore+0x12/0x20 [ 315.070927] [] do_page_fault+0x2f1/0x3d0 [ 315.070927] [] ? __module_text_address+0xb/0x50 [ 315.070927] [] ? is_module_text_address+0x8/0x10 [ 315.070927] [] ? __kernel_text_address+0x47/0x70 [ 315.070927] [] ? print_context_stack+0x41/0xb0 [ 315.070927] [] ? vmalloc_sync_all+0x100/0x100 [ 315.070927] [] error_code+0x58/0x60 [ 315.070927] [] ? create_object+0x29/0x210 [ 315.070927] [] ? vmalloc_sync_all+0x100/0x100 [ 315.070927] [] ? kmem_cache_alloc+0x4a/0x120 [ 315.070927] [] ? create_object+0x29/0x210 [ 315.070927] [] create_object+0x29/0x210 [ 315.070927] [] ? kmemleak_alloc+0x27/0x50 [ 315.070927] [] kmemleak_alloc+0x27/0x50 [ 315.070927] [] kmem_cache_alloc+0x88/0x120 [ 315.070927] [] ? anon_vma_fork+0x50/0xe0 [ 315.070927] [] ? anon_vma_clone+0x82/0xb0 [ 315.070927] [] anon_vma_fork+0x50/0xe0 [ 315.070927] [] dup_mm+0x1d1/0x440 [ 315.070927] [] copy_process+0x98d/0xcc0 [ 315.070927] [] do_fork+0x57/0x2e0 [ 315.070927] [] ? copy_to_user+0x34/0x130 [ 315.070927] [] ? copy_to_user+0x34/0x130 [ 315.070927] [] sys_clone+0x2f/0x40 [ 315.070927] [] ptregs_clone+0x15/0x38 [ 315.070927] [] ? sysenter_do_call+0x12/0x26 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/