From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: To: linux-next@vger.kernel.org, "ocfs2-devel@oss.oracle.com" , Devel FS Linux , Linux Kernel mailing list From: Junxiao Bi Subject: kernel panic on next-20160225 Message-ID: <56CFF19E.4010003@oracle.com> Date: Fri, 26 Feb 2016 14:33:02 +0800 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: Hi, The following panic is triggered when run ocfs2 xattr test on linux-next-20160225. Did anybody ever see this? [ 254.604228] BUG: unable to handle kernel paging request at 00000002000800c0 [ 254.605013] IP: [] kmem_cache_alloc+0x78/0x160 [ 254.605013] PGD 7bbe5067 PUD 0 [ 254.605013] Oops: 0000 [#1] SMP [ 254.605013] Modules linked in: ocfs2_dlmfs ocfs2_stack_o2cb ocfs2_dlm ocfs2_nodemanager ocfs2_stackglue iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi xen_kbdfront xen_netfront xen_fbfront xen_blkfront [ 254.605013] CPU: 2 PID: 4044 Comm: mpirun Not tainted 4.5.0-rc5-next-20160225 #1 [ 254.605013] Hardware name: Xen HVM domU, BIOS 4.3.1OVM 05/14/2014 [ 254.605013] task: ffff88007a521a80 ti: ffff88007aed0000 task.ti: ffff88007aed0000 [ 254.605013] RIP: 0010:[] [] kmem_cache_alloc+0x78/0x160 [ 254.605013] RSP: 0018:ffff88007aed3a48 EFLAGS: 00010282 [ 254.605013] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000001991 [ 254.605013] RDX: 0000000000001990 RSI: 00000000024000c0 RDI: 000000000001b330 [ 254.605013] RBP: ffff88007aed3a98 R08: ffff88007d29b330 R09: 00000002000800c0 [ 254.605013] R10: 0000000c51376d87 R11: ffff8800792cac38 R12: ffff88007cc30f00 [ 254.605013] R13: 00000000024000c0 R14: ffffffff811b053f R15: ffff88007aed3ce7 [ 254.605013] FS: 0000000000000000(0000) GS:ffff88007d280000(0000) knlGS:0000000000000000 [ 254.605013] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 254.605013] CR2: 00000002000800c0 CR3: 000000007aeb2000 CR4: 00000000000406e0 [ 254.605013] Stack: [ 254.605013] 0000000013082000 ffff88007aed3d28 0000007900000000 0000000000000001 [ 254.605013] 2f2f2f2f00000000 ffff8800792cac00 ffff88007aed3d38 0000000000000101 [ 254.605013] ffff88007a5e2000 ffff88007aed3ce7 ffff88007aed3b08 ffffffff811b053f [ 254.605013] Call Trace: [ 254.605013] [] __d_alloc+0x2f/0x1a0 [ 254.605013] [] ? unlazy_walk+0xe2/0x160 [ 254.605013] [] d_alloc+0x17/0x80 [ 254.605013] [] lookup_dcache+0x8a/0xc0 [ 254.605013] [] ? __alloc_pages_nodemask+0x173/0xeb0 [ 254.605013] [] path_openat+0x3c3/0x1210 [ 254.605013] [] ? radix_tree_lookup_slot+0x13/0x30 [ 254.605013] [] ? find_get_entry+0x32/0xc0 [ 254.605013] [] ? atime_needs_update+0x55/0xe0 [ 254.605013] [] ? filemap_fault+0xd1/0x4b0 [ 254.605013] [] ? do_set_pte+0xb6/0x140 [ 254.605013] [] do_filp_open+0x80/0xe0 [ 254.605013] [] ? __alloc_fd+0x48/0x1a0 [ 254.605013] [] ? getname_flags+0x7a/0x1e0 [ 254.605013] [] do_sys_open+0x110/0x200 [ 254.605013] [] SyS_open+0x19/0x20 [ 254.605013] [] do_syscall_64+0x72/0x230 [ 254.605013] [] ? __do_page_fault+0x177/0x430 [ 254.605013] [] entry_SYSCALL64_slow_path+0x25/0x25 [ 254.605013] Code: 05 e6 77 e7 7e 4d 8b 08 49 8b 40 10 4d 85 c9 0f 84 dd 00 00 00 48 85 c0 0f 84 d4 00 00 00 49 63 44 24 20 49 8b 3c 24 48 8d 4a 01 <49> 8b 1c 01 4c 89 c8 65 48 0f c7 0f 0f 94 c0 3c 01 75 b6 49 63 [ 254.605013] RIP [] kmem_cache_alloc+0x78/0x160 [ 254.605013] RSP [ 254.605013] CR2: 00000002000800c0 [ 254.792273] ---[ end trace 823969e602e4aaac ]--- Thanks, Junxiao.