* Kernel Panic
@ 2019-10-15 7:21 Christophe DUMONT
2019-10-15 17:13 ` Valentin Vidić
2019-10-15 20:20 ` Valdis Klētnieks
0 siblings, 2 replies; 11+ messages in thread
From: Christophe DUMONT @ 2019-10-15 7:21 UTC (permalink / raw)
To: kernelnewbies
[-- Attachment #1.1.1: Type: text/plain, Size: 253 bytes --]
Hello Kernel World,
We're facing Kernel Panic on CentOS 7 since upgrading from 3.10.0-957 to 3.10.0-1062. I'm thinking about a java memory leak, but not sure.
Do you know what's going on here ?
Christophe
[cid:image001.png@01D58339.CD24E760]
[-- Attachment #1.1.2: Type: text/html, Size: 3284 bytes --]
[-- Attachment #1.2: image001.png --]
[-- Type: image/png, Size: 52202 bytes --]
[-- Attachment #2: Type: text/plain, Size: 170 bytes --]
_______________________________________________
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
https://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies
^ permalink raw reply [flat|nested] 11+ messages in thread
* Re: Kernel Panic
2019-10-15 7:21 Kernel Panic Christophe DUMONT
@ 2019-10-15 17:13 ` Valentin Vidić
2019-10-15 20:20 ` Valdis Klētnieks
1 sibling, 0 replies; 11+ messages in thread
From: Valentin Vidić @ 2019-10-15 17:13 UTC (permalink / raw)
To: kernelnewbies
On Tue, Oct 15, 2019 at 07:21:18AM +0000, Christophe DUMONT wrote:
> We're facing Kernel Panic on CentOS 7 since upgrading from 3.10.0-957 to 3.10.0-1062. I'm thinking about a java memory leak, but not sure.
> Do you know what's going on here ?
Looks similar to this: https://access.redhat.com/solutions/4164501
--
Valentin
_______________________________________________
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
https://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies
^ permalink raw reply [flat|nested] 11+ messages in thread
* Re: Kernel Panic
2019-10-15 7:21 Kernel Panic Christophe DUMONT
2019-10-15 17:13 ` Valentin Vidić
@ 2019-10-15 20:20 ` Valdis Klētnieks
2019-10-16 7:34 ` Christophe DUMONT
1 sibling, 1 reply; 11+ messages in thread
From: Valdis Klētnieks @ 2019-10-15 20:20 UTC (permalink / raw)
To: Christophe DUMONT; +Cc: kernelnewbies
[-- Attachment #1.1: Type: text/plain, Size: 728 bytes --]
On Tue, 15 Oct 2019 07:21:18 -0000, Christophe DUMONT said:
> We're facing Kernel Panic on CentOS 7 since upgrading from 3.10.0-957 to 3.10.0-1062. I'm thinking about a java memory leak, but not sure.
> Do you know what's going on here ?
Well, what made you think "Java memory leak"?
Java is userspace. If it's leaking memory so far that the kernel has problems, it would probably:
a) Have been leaking memory and causing problems in -957 as well
b) Died in the OOM (Out Of Memory) code, rather than in the futex() system call.
Yes, poorly written Java code will leak memory like a sieve, but this doesn't smell
anything remotely like a memory leak.
I agree with Valentin that it's probably the bug report he references.
[-- Attachment #1.2: Type: application/pgp-signature, Size: 832 bytes --]
[-- Attachment #2: Type: text/plain, Size: 170 bytes --]
_______________________________________________
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
https://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies
^ permalink raw reply [flat|nested] 11+ messages in thread
* RE: Kernel Panic
2019-10-15 20:20 ` Valdis Klētnieks
@ 2019-10-16 7:34 ` Christophe DUMONT
2019-10-16 14:16 ` Valdis Klētnieks
0 siblings, 1 reply; 11+ messages in thread
From: Christophe DUMONT @ 2019-10-16 7:34 UTC (permalink / raw)
To: Valdis Klētnieks; +Cc: kernelnewbies
[-- Attachment #1.1.1.1: Type: text/plain, Size: 1263 bytes --]
Hello,
What made me think about a memory leak is the message : Java Not Tainted 3.10.0-1062.1.1.el7.x86_64.
I can’t access the bug report referenced : an active redhat subscription is needed !
Christophe Dumont
Ligne directe : 0476842574
De : Valdis Kletnieks <valdis@vt.edu> De la part de Valdis Kletnieks
Envoyé : mardi 15 octobre 2019 22:20
À : Christophe DUMONT <Christophe.DUMONT@yoni.fr>
Cc : kernelnewbies@kernelnewbies.org
Objet : Re: Kernel Panic
On Tue, 15 Oct 2019 07:21:18 -0000, Christophe DUMONT said:
> We're facing Kernel Panic on CentOS 7 since upgrading from 3.10.0-957 to 3.10.0-1062. I'm thinking about a java memory leak, but not sure.
> Do you know what's going on here ?
Well, what made you think "Java memory leak"?
Java is userspace. If it's leaking memory so far that the kernel has problems, it would probably:
a) Have been leaking memory and causing problems in -957 as well
b) Died in the OOM (Out Of Memory) code, rather than in the futex() system call.
Yes, poorly written Java code will leak memory like a sieve, but this doesn't smell
anything remotely like a memory leak.
I agree with Valentin that it's probably the bug report he references.
[-- Attachment #1.1.1.2: Type: text/html, Size: 6329 bytes --]
[-- Attachment #1.1.2: image001.png --]
[-- Type: image/png, Size: 8367 bytes --]
[-- Attachment #1.2: Type: application/pgp-signature, Size: 489 bytes --]
[-- Attachment #2: Type: text/plain, Size: 170 bytes --]
_______________________________________________
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
https://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies
^ permalink raw reply [flat|nested] 11+ messages in thread
* Re: Kernel Panic
2019-10-16 7:34 ` Christophe DUMONT
@ 2019-10-16 14:16 ` Valdis Klētnieks
2019-10-17 7:48 ` Christophe DUMONT
2019-10-22 9:38 ` Christophe DUMONT
0 siblings, 2 replies; 11+ messages in thread
From: Valdis Klētnieks @ 2019-10-16 14:16 UTC (permalink / raw)
To: Christophe DUMONT; +Cc: kernelnewbies
[-- Attachment #1.1: Type: text/plain, Size: 876 bytes --]
On Wed, 16 Oct 2019 07:34:01 -0000, Christophe DUMONT said:
> What made me think about a memory leak is the message : Java Not Tainted 3.10.0-1062.1.1.el7.x86_64.=20
That just tells you that the currently executing process was java.
It says nothing at all about a memory leak, and as I already mentioned, if Java
was leaking memory, it would almost certainly have been leaking memory on a
previous kernel.
The important part almost always isn't the running process, it's the kernel
stack traceback, which in this case has 'futex' scribbled *all* over it.
General rule of thumb:
If you get more than one crash that has a similar traceback that points at a
specific syscall, or file system driver, etc, the bug is almost guaranteed to
be in that code.
If you get a rash of crashes with *different* tracebacks, you probably have
some other code that's overlaying memory.
[-- Attachment #1.2: Type: application/pgp-signature, Size: 832 bytes --]
[-- Attachment #2: Type: text/plain, Size: 170 bytes --]
_______________________________________________
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
https://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies
^ permalink raw reply [flat|nested] 11+ messages in thread
* RE: Kernel Panic
2019-10-16 14:16 ` Valdis Klētnieks
@ 2019-10-17 7:48 ` Christophe DUMONT
2019-10-17 7:54 ` Valentin Vidić
2019-10-22 9:38 ` Christophe DUMONT
1 sibling, 1 reply; 11+ messages in thread
From: Christophe DUMONT @ 2019-10-17 7:48 UTC (permalink / raw)
To: Valdis Klētnieks; +Cc: kernelnewbies
[-- Attachment #1.1.1.1: Type: text/plain, Size: 1436 bytes --]
We can put aside Java Memory Leak.
I downgraded to kernel 3.10.0-957.27.2.el7.x86_64, there are no more crashes.
The bug comes from ‘futex‘ syscall. What can causes that bug and how can i investigate ?
Christophe Dumont
Ligne directe : 0476842574
De : Valdis Kletnieks <valdis@vt.edu> De la part de Valdis Kletnieks
Envoyé : mercredi 16 octobre 2019 16:17
À : Christophe DUMONT <Christophe.DUMONT@yoni.fr>
Cc : kernelnewbies@kernelnewbies.org
Objet : Re: Kernel Panic
On Wed, 16 Oct 2019 07:34:01 -0000, Christophe DUMONT said:
> What made me think about a memory leak is the message : Java Not Tainted 3.10.0-1062.1.1.el7.x86_64.=20
That just tells you that the currently executing process was java.
It says nothing at all about a memory leak, and as I already mentioned, if Java
was leaking memory, it would almost certainly have been leaking memory on a
previous kernel.
The important part almost always isn't the running process, it's the kernel
stack traceback, which in this case has 'futex' scribbled *all* over it.
General rule of thumb:
If you get more than one crash that has a similar traceback that points at a
specific syscall, or file system driver, etc, the bug is almost guaranteed to
be in that code.
If you get a rash of crashes with *different* tracebacks, you probably have
some other code that's overlaying memory.
[-- Attachment #1.1.1.2: Type: text/html, Size: 6353 bytes --]
[-- Attachment #1.1.2: image001.png --]
[-- Type: image/png, Size: 8367 bytes --]
[-- Attachment #1.2: Type: application/pgp-signature, Size: 489 bytes --]
[-- Attachment #2: Type: text/plain, Size: 170 bytes --]
_______________________________________________
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
https://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies
^ permalink raw reply [flat|nested] 11+ messages in thread
* RE: Kernel Panic
2019-10-16 14:16 ` Valdis Klētnieks
2019-10-17 7:48 ` Christophe DUMONT
@ 2019-10-22 9:38 ` Christophe DUMONT
2019-10-22 17:20 ` Greg KH
1 sibling, 1 reply; 11+ messages in thread
From: Christophe DUMONT @ 2019-10-22 9:38 UTC (permalink / raw)
To: Valdis Klētnieks; +Cc: kernelnewbies
[-- Attachment #1.1.1.1: Type: text/plain, Size: 1332 bytes --]
Hello,
We downgraded to older kernel. We still facing the same Kernel Panic with different Kernel.
Christophe Dumont
Ligne directe : 0476842574
De : Valdis Kletnieks <valdis@vt.edu> De la part de Valdis Kletnieks
Envoyé : mercredi 16 octobre 2019 16:17
À : Christophe DUMONT <Christophe.DUMONT@yoni.fr>
Cc : kernelnewbies@kernelnewbies.org
Objet : Re: Kernel Panic
On Wed, 16 Oct 2019 07:34:01 -0000, Christophe DUMONT said:
> What made me think about a memory leak is the message : Java Not Tainted 3.10.0-1062.1.1.el7.x86_64.=20
That just tells you that the currently executing process was java.
It says nothing at all about a memory leak, and as I already mentioned, if Java
was leaking memory, it would almost certainly have been leaking memory on a
previous kernel.
The important part almost always isn't the running process, it's the kernel
stack traceback, which in this case has 'futex' scribbled *all* over it.
General rule of thumb:
If you get more than one crash that has a similar traceback that points at a
specific syscall, or file system driver, etc, the bug is almost guaranteed to
be in that code.
If you get a rash of crashes with *different* tracebacks, you probably have
some other code that's overlaying memory.
[-- Attachment #1.1.1.2: Type: text/html, Size: 6241 bytes --]
[-- Attachment #1.1.2: image001.png --]
[-- Type: image/png, Size: 8367 bytes --]
[-- Attachment #1.2: Type: application/pgp-signature, Size: 489 bytes --]
[-- Attachment #2: Type: text/plain, Size: 170 bytes --]
_______________________________________________
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
https://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies
^ permalink raw reply [flat|nested] 11+ messages in thread
* kernel panic
@ 2015-10-15 11:23 jinzhao at wingtech.com
2015-10-16 11:36 ` Mulyadi Santosa
0 siblings, 1 reply; 11+ messages in thread
From: jinzhao at wingtech.com @ 2015-10-15 11:23 UTC (permalink / raw)
To: kernelnewbies
Dear all:
I met a problem as below, what the function of walk_page_range??
Exception Class: Kernel (KE)
PC is at [<ffffffc00017fc90>] walk_page_range+0x3c/0x314
Current Executing Process:
[Binder_C, 3611][main, 354]
Backtrace:
[<ffffffc0009f21dc>] __do_kernel_fault.part.5+0x70/0x84
[<ffffffc0000942f4>] do_bad_area+0x90/0x94
[<ffffffc000094340>] do_translation_fault+0x30/0x4c
[<ffffffc0000813fc>] do_mem_abort+0x38/0x98
[<ffffffc000083c58>] el1_da+0x1c/0x88
[<ffffffc0001eb3e0>] show_smap+0x88/0x284
[<ffffffc0001eb5e8>] show_pid_smap+0xc/0x18
[<ffffffc0001aefb8>] seq_read+0x1a4/0x40c
[<ffffffc00018e75c>] vfs_read+0x88/0x170
[<ffffffc00018ebf0>] SyS_read+0x40/0x8c
[<ffffffc000084308>] cpu_switch_to+0x48/0x4c
[<ffffffffffffffff>] 0xffffffffffffffff
Thanks!
jinzhao at wingtech.cn
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.kernelnewbies.org/pipermail/kernelnewbies/attachments/20151015/440e76ee/attachment.html
^ permalink raw reply [flat|nested] 11+ messages in thread
* kernel panic
2015-10-15 11:23 kernel panic jinzhao at wingtech.com
@ 2015-10-16 11:36 ` Mulyadi Santosa
0 siblings, 0 replies; 11+ messages in thread
From: Mulyadi Santosa @ 2015-10-16 11:36 UTC (permalink / raw)
To: kernelnewbies
On Thu, Oct 15, 2015 at 6:23 PM, jinzhao at wingtech.com <jinzhao@wingtech.com>
wrote:
> Dear all:
> I met a problem as below, what the function of walk_page_range??
> Exception Class: Kernel (KE)
> PC is at [<ffffffc00017fc90>] walk_page_range+0x3c/0x314
>
> Current Executing Process:
> [Binder_C, 3611][main, 354]
>
> Backtrace:
> [<ffffffc0009f21dc>] __do_kernel_fault.part.5+0x70/0x84
> [<ffffffc0000942f4>] do_bad_area+0x90/0x94
> [<ffffffc000094340>] do_translation_fault+0x30/0x4c
> [<ffffffc0000813fc>] do_mem_abort+0x38/0x98
> [<ffffffc000083c58>] el1_da+0x1c/0x88
> [<ffffffc0001eb3e0>] show_smap+0x88/0x284
> [<ffffffc0001eb5e8>] show_pid_smap+0xc/0x18
> [<ffffffc0001aefb8>] seq_read+0x1a4/0x40c
> [<ffffffc00018e75c>] vfs_read+0x88/0x170
> [<ffffffc00018ebf0>] SyS_read+0x40/0x8c
> [<ffffffc000084308>] cpu_switch_to+0x48/0x4c
> [<ffffffffffffffff>] 0xffffffffffffffff
>
>
> Thanks!
> ------------------------------
> jinzhao at wingtech.cn
>
>
AFAIK, that's the function to get PTE of the related pages, then get the
virtual address of them.
Maybe the caller hit invalid PTE ?
--
regards,
Mulyadi Santosa
Freelance Linux trainer and consultant
blog: the-hydra.blogspot.com
training: mulyaditraining.blogspot.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.kernelnewbies.org/pipermail/kernelnewbies/attachments/20151016/0ef8f374/attachment.html
^ permalink raw reply [flat|nested] 11+ messages in thread
end of thread, other threads:[~2019-10-22 17:21 UTC | newest]
Thread overview: 11+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-10-15 7:21 Kernel Panic Christophe DUMONT
2019-10-15 17:13 ` Valentin Vidić
2019-10-15 20:20 ` Valdis Klētnieks
2019-10-16 7:34 ` Christophe DUMONT
2019-10-16 14:16 ` Valdis Klētnieks
2019-10-17 7:48 ` Christophe DUMONT
2019-10-17 7:54 ` Valentin Vidić
2019-10-22 9:38 ` Christophe DUMONT
2019-10-22 17:20 ` Greg KH
-- strict thread matches above, loose matches on Subject: below --
2015-10-15 11:23 kernel panic jinzhao at wingtech.com
2015-10-16 11:36 ` Mulyadi Santosa
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).