[Patch v3 7/7] add a new interface to show the memory usage of 1st kernel
bhe at redhat.com
bhe at redhat.com
Tue Aug 26 07:12:44 PDT 2014
On 08/26/14 at 08:25am, Petr Tesarik wrote:
> On Tue, 26 Aug 2014 11:22:47 +0800
> "bhe at redhat.com" <bhe at redhat.com> wrote:
>
> >[...]
> > Here it use lseek to position, then try to read, and then reading failed
> > and raised a SIGKILL.
> >
> > lseek(3, 8799381360640, SEEK_SET) = 8799381360640
> > read(3, <unfinished ...>
> > +++ killed by SIGKILL +++
> > Killed
>
> This smells like killed by OOM Killer. Can you check the kernel log if
> there's anything?
Thanks for notice, it is caused by kernel addr validation check in
read_kcore. No idea why it happened.
[ +35.288439] BUG: unable to handle kernel paging request at
ffff8800c4000000
[ +0.011559] IP: [<ffffffff8105870b>] kern_addr_valid+0x15b/0x1b0
[ +0.010586] PGD 220f067 PUD 2213067 PMD 80000000c4000062
[ +0.009994] Oops: 0000 [#1] SMP
[ +0.007782] Modules linked in: xt_CHECKSUM nf_conntrack_netbios_ns
nf_conntrack_broadcast ipt_MASQUERADE ip6t_REJECT xt_conntrack cfg80211
rfki
[ +0.084041] CPU: 2 PID: 1679 Comm: makedumpfile Not tainted 3.17.0-rc2
#15
[ +0.012249] Hardware name: Dell Inc. PowerEdge T105 /0J001K, BIOS
1.4.4 07/30/2009
[ +0.012991] task: ffff8800c010ae40 ti: ffff880214830000 task.ti:
ffff880214830000
[ +0.012886] RIP: 0010:[<ffffffff8105870b>] [<ffffffff8105870b>]
kern_addr_valid+0x15b/0x1b0
[ +0.013860] RSP: 0018:ffff880214833e88 EFLAGS: 00010206
[ +0.010710] RAX: 00000000c4000000 RBX: 0000000000001000 RCX:
0000000000000000
[ +0.012445] RDX: 00000000c4000000 RSI: ffff880000000000 RDI:
80000000c4000062
[ +0.012298] RBP: ffff880214833e88 R08: 000000000000000e R09:
00007fffffffffff
[ +0.012322] R10: 0000000000000001 R11: 0000000000000246 R12:
0000000000001000
[ +0.012316] R13: 00000000022beb10 R14: ffff880214833f50 R15:
ffff8800c4000000
[ +0.012308] FS: 00007f0c91ffa740(0000) GS:ffff88022fd00000(0000)
knlGS:0000000000000000
[ +0.013315] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ +0.010985] CR2: ffff8800c4000000 CR3: 000000021a632000 CR4:
00000000000007e0
[ +0.012266] Stack:
[ +0.006976] ffff880214833ee0 ffffffff81255c38 ffff880214929410
0000000000000000
[ +0.012471] 0000000d14833ed8 0000000000001000 ffff880223c7c480
00000000022beb10
[ +0.012465] ffff880214833f50 0000000000001000 00007ffffe1840c0
ffff880214833f00
[ +0.012456] Call Trace:
[ +0.007459] [<ffffffff81255c38>] read_kcore+0x228/0x300
[ +0.010392] [<ffffffff8124962d>] proc_reg_read+0x3d/0x80
[ +0.010491] [<ffffffff811e58f8>] vfs_read+0x98/0x170
[ +0.010153] [<ffffffff811e6576>] SyS_read+0x46/0xb0
[ +0.010034] [<ffffffff8111d5f6>] ? __audit_syscall_exit+0x1f6/0x2a0
[ +0.011425] [<ffffffff8181dea9>] system_call_fastpath+0x16/0x1b
[ +0.011072] Code: 48 89 f8 66 66 66 90 48 be 00 f0 ff ff ff 3f 00 00
48 c1 ea 09 48 21 f0 81 e2 f8 0f 00 00 48 be 00 00 00 00 00 88 ff ff 48
01
[ +0.030537] RIP [<ffffffff8105870b>] kern_addr_valid+0x15b/0x1b0
[ +0.011666] RSP <ffff880214833e88>
[ +0.009043] CR2: ffff8800c4000000
[ +0.042194] ---[ end trace 97512601fec12186 ]---
More information about the kexec
mailing list