From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753210AbdDJMsU (ORCPT ); Mon, 10 Apr 2017 08:48:20 -0400 Received: from mx2.suse.de ([195.135.220.15]:45053 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752343AbdDJMsS (ORCPT ); Mon, 10 Apr 2017 08:48:18 -0400 Date: Mon, 10 Apr 2017 14:48:15 +0200 From: Michal Hocko To: zhong jiang Cc: Mel Gorman , Johannes Weiner , vdavydov.dev@gmail.com, Vlastimil Babka , Linux Memory Management List , LKML Subject: Re: NULL pointer dereference in the kernel 3.10 Message-ID: <20170410124814.GC4618@dhcp22.suse.cz> References: <58E8E81E.6090304@huawei.com> <20170410085604.zpenj6ggc3dsbgxw@techsingularity.net> <58EB761E.9040002@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <58EB761E.9040002@huawei.com> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon 10-04-17 20:10:06, zhong jiang wrote: > On 2017/4/10 16:56, Mel Gorman wrote: > > On Sat, Apr 08, 2017 at 09:39:42PM +0800, zhong jiang wrote: > >> when runing the stabile docker cases in the vm. The following issue will come up. > >> > >> #40 [ffff8801b57ffb30] async_page_fault at ffffffff8165c9f8 > >> [exception RIP: down_read_trylock+5] > >> RIP: ffffffff810aca65 RSP: ffff8801b57ffbe8 RFLAGS: 00010202 > >> RAX: 0000000000000000 RBX: ffff88018ae858c1 RCX: 0000000000000000 > >> RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 > >> RBP: ffff8801b57ffc10 R8: ffffea0006903de0 R9: ffff8800b3c61810 > >> R10: 00000000000022cb R11: 0000000000000000 R12: ffff88018ae858c0 > >> R13: ffffea0006903dc0 R14: 0000000000000008 R15: ffffea0006903dc0 > >> ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0000 > > Post the full report including the kernel version and state whether any > > additional patches to 3.10 are applied. > > > Hi, Mel > > Our kernel from RHEL 7.2, Addtional patches all from upstream -- include Bugfix and CVE. I believe you should contact Redhat for the support. This is a) old kernel and b) with other patches which might or might not be relevant. -- Michal Hocko SUSE Labs