Bug 705441
Summary: | intel-iommu: missing flush prior to removing domains + avoid broken vm/si domain unlinking | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | Alex Williamson <alex.williamson> | |
Component: | kernel | Assignee: | Alex Williamson <alex.williamson> | |
Status: | CLOSED ERRATA | QA Contact: | WANG Chao <chaowang> | |
Severity: | high | Docs Contact: | ||
Priority: | urgent | |||
Version: | 6.1 | CC: | arozansk, chrisw, czhang, ddutile, gcosta, jolsa, jpirko, juzhang, jwest, kzhang, moli, moshiro, ruyang, wojtur, yang.z.zhang | |
Target Milestone: | rc | Keywords: | ZStream | |
Target Release: | --- | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | kernel-2.6.32-160.el6 | Doc Type: | Bug Fix | |
Doc Text: |
A previously introduced update intended to prevent IOMMU (I/O Memory Management Unit) domain exhaustion introduced two regressions. The first regression was a race where a domain pointer could be freed while a lazy flush algorithm still had a reference to it, eventually causing kernel panic. The second regression was an erroneous reference removal for identity mapped and VM IOMMU domains, causing I/O errors. Both of these regressions could only be triggered on Intel based platforms, supporting VT-d, booted with the intel_iommu=on boot option. With this update, the underlying source code of the intel-iommu driver has been modified to resolve both of these problems. A forced flush is now used to avoid the lazy use after free issue, and extra checks have been added to avoid the erroneous reference removal.
|
Story Points: | --- | |
Clone Of: | ||||
: | 705455 (view as bug list) | Environment: | ||
Last Closed: | 2011-12-06 13:31:52 UTC | Type: | --- | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 705455, 713458 |
Description
Alex Williamson
2011-05-17 17:17:36 UTC
This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux maintenance release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux Update release for currently deployed products. This request is not yet committed for inclusion in an Update release. It looks like the race can be avoided by using the intel_iommu=strict flag, but that also imposes a performance penalty in not batching up unmaps. *** Bug 706001 has been marked as a duplicate of this bug. *** *** Bug 706004 has been marked as a duplicate of this bug. *** QA: please use the test cases from the above bugs (706001 & 706004) when validating this. 706001 is most readily hit by assigning and un-assigning an e1000e NIC to a VM. 706004 is easily reproduced by unbinding an re-binding a device from the snd-hda-intel driver. Both of these require a VT-d capable system booted with intel_iommu=on. *** Bug 710382 has been marked as a duplicate of this bug. *** Brew build of posted fix: https://brewweb.devel.redhat.com/taskinfo?taskID=3361081 Patch(es) available on kernel-2.6.32-160.el6 Technical note added. If any revisions are required, please edit the "Technical Notes" field accordingly. All revisions will be proofread by the Engineering Content Services team. New Contents: A previously introduced update intended to prevent IOMMU (I/O Memory Management Unit) domain exhaustion introduced two regressions. The first regression was a race where a domain pointer could be freed while a lazy flush algorithm still had a reference to it, eventually causing kernel panic. The second regression was an erroneous reference removal for identity mapped and VM IOMMU domains, causing I/O errors. Both of these regressions could only be triggered on Intel based platforms, supporting VT-d, booted with the intel_iommu=on boot option. With this update, the underlying source code of the intel-iommu driver has been modified to resolve both of these problems. A forced flush is now used to avoid the lazy use after free issue, and extra checks have been added to avoid the erroneous reference removal. *** Bug 730604 has been marked as a duplicate of this bug. *** Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHSA-2011-1530.html I am seeing occasional kernel oopses on our DELL C6220's which seem to be related to this bug ------------[ cut here ]------------ kernel BUG at mm/slab.c:3067! invalid opcode: 0000 [#1] SMP last sysfs file: /sys/devices/pci0000:00/0000:00:1f.2/host0/target0:0:0/0:0:0:0/block/sda/uevent CPU 5 Modules linked in: fuse lmv(U) mgc(U) lustre(U) lov(U) osc(U) lquota(U) mdc(U) fid(U) fld(U) ko2iblnd(U) ptlrpc(U) obdclass(U) lnet(U) lvfs(U) libcfs(U) ip6table_filter act_police cls_basic cls_flow cls_fw cls_u32 sch_tbf sch_prio sch_htb sch_hfsc sch_ingress sch_sfq bridge stp llc xt_statistic xt_time xt_connlimit xt_realm iptable_raw xt_comment xt_recent xt_policy ipt_ULOG ipt_REJECT ipt_REDIRECT ipt_NETMAP ipt_MASQUERADE ipt_ECN ipt_ecn ipt_CLUSTERIP ipt_ah ipt_addrtype xt_set ip_set nf_nat_tftp nf_nat_snmp_basic nf_conntrack_snmp nf_nat_sip nf_nat_pptp nf_nat_proto_gre nf_nat_irc nf_nat_h323 nf_nat_ftp nf_nat_amanda ts_kmp nf_conntrack_amanda nf_conntrack_sane nf_conntrack_tftp nf_conntrack_sip nf_conntrack_proto_udplite nf_conntrack_proto_sctp nf_conntrack_pptp nf_conntrack_proto_gre nf_conntrack_netlink nf_conntrack_netbios_ns nf_conntrack_broadcast nf_conntrack_irc nf_conntrack_h323 nf_conntrack_ftp xt_TPROXY nf_tproxy_core ip6_tables nf_defrag_ipv6 xt_tcpmss xt_pkttype xt_physdev xt_owner xt_NFQUEUE xt_NFLOG nfnetlink_log xt_multiport xt_MARK xt_mark xt_mac xt_limit xt_length xt_iprange xt_helper xt_hashlimit xt_DSCP xt_dscp xt_dccp xt_conntrack xt_CONNMARK xt_connmark xt_CLASSIFY xt_AUDIT ipt_LOG xt_state iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_conntrack iptable_mangle nfnetlink iptable_filter ip_tables nfsd exportfs acpi_cpufreq freq_table mperf rdma_ucm(U) rdma_cm(U) iw_cm(U) ib_addr(U) ib_ipoib(U) ib_cm(U) ib_sa(U) ib_uverbs(U) ib_umad(U) mlx4_ib(U) ib_mad(U) ib_core(U) mlx4_core(U) ext4 mbcache jbd2 dm_mirror dm_region_hash dm_log dm_mod vhost_net macvtap macvlan tun kvm wmi microcode dcdbas sg sb_edac edac_core i2c_i801 i2c_core shpchp iTCO_wdt iTCO_vendor_support ioatdma ipv6 sd_mod crc_t10dif ahci igb dca nfs lockd fscache nfs_acl auth_rpcgss sunrpc [last unloaded: scsi_wait_scan] Pid: 68226, comm: polkit-gnome-au Tainted: G B W ---------------- 2.6.32-220.23.1.el6.x86_64 #1 Dell Inc. PowerEdge C6220/0WTH3T RIP: 0010:[<ffffffff8115e9f4>] [<ffffffff8115e9f4>] cache_alloc_refill+0x1e4/0x240 RSP: 0018:ffff881789145c90 EFLAGS: 00010046 RAX: 000000000000001c RBX: ffff88207fc50080 RCX: 000000000000005c RDX: ffff8808f7775000 RSI: ffff88107febaf40 RDI: ffff880dbd3f1000 RBP: ffff881789145cf0 R08: ffff8808f7775000 R09: 0000000000000000 R10: 00000035a6003000 R11: 0000000000000000 R12: ffff88105922c400 R13: ffff88107febaf40 R14: 000000000000001c R15: ffff880dbd3f1000 FS: 00007eff8508f8e0(0000) GS:ffff8800606a0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b CR2: 00007eff7bc05000 CR3: 0000001fffa51000 CR4: 00000000000406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Process polkit-gnome-au (pid: 68226, threadinfo ffff881789144000, task ffff881b0f2d2ac0) Stack: 00000035a6002000 0000000046da1980 ffff88107febaf80 000412d081138cb6 <0> ffff88107febaf60 ffff88107febaf50 ffff881789145d00 0000000000000000 <0> 00000000000000d0 ffff88207fc50080 00000000000000d0 0000000000000246 Call Trace: [<ffffffff8115f90f>] kmem_cache_alloc+0x15f/0x190 [<ffffffff811450a1>] anon_vma_fork+0x61/0xd0 [<ffffffff8106758e>] dup_mm+0x23e/0x520 [<ffffffff810685bc>] copy_process+0xcdc/0x13b0 [<ffffffff8115f932>] ? kmem_cache_alloc+0x182/0x190 [<ffffffff81068d24>] do_fork+0x94/0x480 [<ffffffff81193a72>] ? alloc_fd+0x92/0x160 [<ffffffff81173dc7>] ? fd_install+0x47/0x90 [<ffffffff8118113f>] ? do_pipe_flags+0xcf/0x130 [<ffffffff81009598>] sys_clone+0x28/0x30 [<ffffffff8100b413>] stub_clone+0x13/0x20 [<ffffffff8100b0f2>] ? system_call_fastpath+0x16/0x1b Code: 89 ff e8 00 d5 11 00 eb 99 66 0f 1f 44 00 00 41 c7 45 60 01 00 00 00 4d 8b 7d 20 4c 39 7d c0 0f 85 f2 fe ff ff eb 84 0f 0b eb fe <0f> 0b 66 2e 0f 1f 84 00 00 00 00 00 eb f4 8b 55 ac 8b 75 bc 31 RIP [<ffffffff8115e9f4>] cache_alloc_refill+0x1e4/0x240 RSP <ffff881789145c90> ---[ end trace 552278685cb3ea33 ]--- Kernel panic - not syncing: Fatal exception Pid: 68226, comm: polkit-gnome-au Tainted: G B D W ---------------- 2.6.32-220.23.1.el6.x86_64 #1 Call Trace: [<ffffffff814ecb34>] ? panic+0x78/0x143 [<ffffffff814f0cd4>] ? oops_end+0xe4/0x100 [<ffffffff8100f26b>] ? die+0x5b/0x90 [<ffffffff814f05a4>] ? do_trap+0xc4/0x160 [<ffffffff8100ce35>] ? do_invalid_op+0x95/0xb0 [<ffffffff8115e9f4>] ? cache_alloc_refill+0x1e4/0x240 [<ffffffff8114d688>] ? __swap_duplicate+0x68/0x180 [<ffffffff8114d805>] ? swap_duplicate+0x25/0x60 [<ffffffff8100bedb>] ? invalid_op+0x1b/0x20 [<ffffffff8115e9f4>] ? cache_alloc_refill+0x1e4/0x240 [<ffffffff8115f90f>] ? kmem_cache_alloc+0x15f/0x190 [<ffffffff811450a1>] ? anon_vma_fork+0x61/0xd0 [<ffffffff8106758e>] ? dup_mm+0x23e/0x520 [<ffffffff810685bc>] ? copy_process+0xcdc/0x13b0 [<ffffffff8115f932>] ? kmem_cache_alloc+0x182/0x190 [<ffffffff81068d24>] ? do_fork+0x94/0x480 [<ffffffff81193a72>] ? alloc_fd+0x92/0x160 [<ffffffff81173dc7>] ? fd_install+0x47/0x90 [<ffffffff8118113f>] ? do_pipe_flags+0xcf/0x130 [<ffffffff81009598>] ? sys_clone+0x28/0x30 [<ffffffff8100b413>] ? stub_clone+0x13/0x20 [<ffffffff8100b0f2>] ? system_call_fastpath+0x16/0x1b ------------[ cut here ]------------ WARNING: at arch/x86/kernel/smp.c:117 native_smp_send_reschedule+0x5c/0x60() (Tainted: G B D W ---------------- ) Hardware name: PowerEdge C6220 Modules linked in: fuse lmv(U) mgc(U) lustre(U) lov(U) osc(U) lquota(U) mdc(U) fid(U) fld(U) ko2iblnd(U) ptlrpc(U) obdclass(U) lnet(U) lvfs(U) libcfs(U) ip6table_filter act_police cls_basic cls_flow cls_fw cls_u32 sch_tbf sch_prio sch_htb sch_hfsc sch_ingress sch_sfq bridge stp llc xt_statistic xt_time xt_connlimit xt_realm iptable_raw xt_comment xt_recent xt_policy ipt_ULOG ipt_REJECT ipt_REDIRECT ipt_NETMAP ipt_MASQUERADE ipt_ECN ipt_ecn ipt_CLUSTERIP ipt_ah ipt_addrtype xt_set ip_set nf_nat_tftp nf_nat_snmp_basic nf_conntrack_snmp nf_nat_sip nf_nat_pptp nf_nat_proto_gre nf_nat_irc nf_nat_h323 nf_nat_ftp nf_nat_amanda ts_kmp nf_conntrack_amanda nf_conntrack_sane nf_conntrack_tftp nf_conntrack_sip nf_conntrack_proto_udplite nf_conntrack_proto_sctp nf_conntrack_pptp nf_conntrack_proto_gre nf_conntrack_netlink nf_conntrack_netbios_ns nf_conntrack_broadcast nf_conntrack_irc nf_conntrack_h323 nf_conntrack_ftp xt_TPROXY nf_tproxy_core ip6_tables nf_defrag_ipv6 xt_tcpmss xt_pkttype xt_physdev xt_owner xt_NFQUEUE xt_NFLOG nfnetlink_log xt_multiport xt_MARK xt_mark xt_mac xt_limit xt_length xt_iprange xt_helper xt_hashlimit xt_DSCP xt_dscp xt_dccp xt_conntrack xt_CONNMARK xt_connmark xt_CLASSIFY xt_AUDIT ipt_LOG xt_state iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_conntrack iptable_mangle nfnetlink iptable_filter ip_tables nfsd exportfs acpi_cpufreq freq_table mperf rdma_ucm(U) rdma_cm(U) iw_cm(U) ib_addr(U) ib_ipoib(U) ib_cm(U) ib_sa(U) ib_uverbs(U) ib_umad(U) mlx4_ib(U) ib_mad(U) ib_core(U) mlx4_core(U) ext4 mbcache jbd2 dm_mirror dm_region_hash dm_log dm_mod vhost_net macvtap macvlan tun kvm wmi microcode dcdbas sg sb_edac edac_core i2c_i801 i2c_core shpchp iTCO_wdt iTCO_vendor_support ioatdma ipv6 sd_mod crc_t10dif ahci igb dca nfs lockd fscache nfs_acl auth_rpcgss sunrpc [last unloaded: scsi_wait_scan] Pid: 68226, comm: polkit-gnome-au Tainted: G B D W ---------------- 2.6.32-220.23.1.el6.x86_64 #1 Call Trace: <IRQ> [<ffffffff81069c97>] ? warn_slowpath_common+0x87/0xc0 [<ffffffff81069cea>] ? warn_slowpath_null+0x1a/0x20 [<ffffffff8102a36c>] ? native_smp_send_reschedule+0x5c/0x60 [<ffffffff8104d9c8>] ? resched_task+0x68/0x80 [<ffffffff81053190>] ? check_preempt_wakeup+0x1c0/0x260 [<ffffffff8106196b>] ? enqueue_task_fair+0xfb/0x100 [<ffffffff8104da7c>] ? check_preempt_curr+0x7c/0x90 [<ffffffff8105e863>] ? try_to_wake_up+0x213/0x3e0 [<ffffffff81094e90>] ? hrtimer_wakeup+0x0/0x30 [<ffffffff8105ea85>] ? wake_up_process+0x15/0x20 [<ffffffff81094eb2>] ? hrtimer_wakeup+0x22/0x30 [<ffffffff810954ae>] ? __run_hrtimer+0x8e/0x1a0 [<ffffffff81012b59>] ? read_tsc+0x9/0x20 [<ffffffff81095856>] ? hrtimer_interrupt+0xe6/0x250 [<ffffffff814f55fb>] ? smp_apic_timer_interrupt+0x6b/0x9b [<ffffffff8100bc13>] ? apic_timer_interrupt+0x13/0x20 <EOI> [<ffffffff814ecbdc>] ? panic+0x120/0x143 [<ffffffff814ecb69>] ? panic+0xad/0x143 [<ffffffff814f0cd4>] ? oops_end+0xe4/0x100 [<ffffffff8100f26b>] ? die+0x5b/0x90 [<ffffffff814f05a4>] ? do_trap+0xc4/0x160 [<ffffffff8100ce35>] ? do_invalid_op+0x95/0xb0 [<ffffffff8115e9f4>] ? cache_alloc_refill+0x1e4/0x240 [<ffffffff8114d688>] ? __swap_duplicate+0x68/0x180 [<ffffffff8114d805>] ? swap_duplicate+0x25/0x60 [<ffffffff8100bedb>] ? invalid_op+0x1b/0x20 [<ffffffff8115e9f4>] ? cache_alloc_refill+0x1e4/0x240 [<ffffffff8115f90f>] ? kmem_cache_alloc+0x15f/0x190 [<ffffffff811450a1>] ? anon_vma_fork+0x61/0xd0 [<ffffffff8106758e>] ? dup_mm+0x23e/0x520 [<ffffffff810685bc>] ? copy_process+0xcdc/0x13b0 [<ffffffff8115f932>] ? kmem_cache_alloc+0x182/0x190 [<ffffffff81068d24>] ? do_fork+0x94/0x480 [<ffffffff81193a72>] ? alloc_fd+0x92/0x160 [<ffffffff81173dc7>] ? fd_install+0x47/0x90 [<ffffffff8118113f>] ? do_pipe_flags+0xcf/0x130 [<ffffffff81009598>] ? sys_clone+0x28/0x30 [<ffffffff8100b413>] ? stub_clone+0x13/0x20 [<ffffffff8100b0f2>] ? system_call_fastpath+0x16/0x1b ---[ end trace 552278685cb3ea34 ]--- Kernel panic - not syncing: Watchdog detected hard LOCKUP on cpu 3 Pid: 68225, comm: polkit-gnome-au Tainted: G B D W ---------------- 2.6.32-220.23.1.el6.x86_64 #1 Call Trace: <NMI> [<ffffffff814ecb34>] ? panic+0x78/0x143 [<ffffffff810d91fd>] ? watchdog_overflow_callback+0xcd/0xd0 [<ffffffff8110aaed>] ? __perf_event_overflow+0x9d/0x230 [<ffffffff8110b0a4>] ? perf_event_overflow+0x14/0x20 [<ffffffff8101e216>] ? intel_pmu_handle_irq+0x336/0x550 [<ffffffff814f2716>] ? kprobe_exceptions_notify+0x16/0x430 [<ffffffff814f11f9>] ? perf_event_nmi_handler+0x39/0xb0 [<ffffffff814f2d45>] ? notifier_call_chain+0x55/0x80 [<ffffffff814f2daa>] ? atomic_notifier_call_chain+0x1a/0x20 [<ffffffff81096d0e>] ? notify_die+0x2e/0x30 [<ffffffff814f09c3>] ? do_nmi+0x173/0x2b0 [<ffffffff814f02d0>] ? nmi+0x20/0x30 [<ffffffff814efb3e>] ? _spin_lock+0x1e/0x30 <<EOE>> [<ffffffff8115e89a>] ? cache_alloc_refill+0x8a/0x240 [<ffffffff8115e96b>] ? cache_alloc_refill+0x15b/0x240 [<ffffffff8115f90f>] ? kmem_cache_alloc+0x15f/0x190 [<ffffffff811450a1>] ? anon_vma_fork+0x61/0xd0 [<ffffffff8106758e>] ? dup_mm+0x23e/0x520 [<ffffffff810685bc>] ? copy_process+0xcdc/0x13b0 [<ffffffff8115f932>] ? kmem_cache_alloc+0x182/0x190 [<ffffffff81068d24>] ? do_fork+0x94/0x480 [<ffffffff81193a72>] ? alloc_fd+0x92/0x160 [<ffffffff81173dc7>] ? fd_install+0x47/0x90 [<ffffffff8118113f>] ? do_pipe_flags+0xcf/0x130 [<ffffffff81009598>] ? sys_clone+0x28/0x30 [<ffffffff8100b413>] ? stub_clone+0x13/0x20 [<ffffffff8100b0f2>] ? system_call_fastpath+0x16/0x1b Kernel panic - not syncing: Watchdog detected hard LOCKUP on cpu 7 Pid: 68685, comm: polkit-gnome-au Tainted: G B D W ---------------- 2.6.32-220.23.1.el6.x86_64 #1 Call Trace: <NMI> [<ffffffff814ecb34>] ? panic+0x78/0x143 [<ffffffff810d91fd>] ? watchdog_overflow_callback+0xcd/0xd0 [<ffffffff8110aaed>] ? __perf_event_overflow+0x9d/0x230 [<ffffffff8110b0a4>] ? perf_event_overflow+0x14/0x20 [<ffffffff8101e216>] ? intel_pmu_handle_irq+0x336/0x550 [<ffffffff814f2716>] ? kprobe_exceptions_notify+0x16/0x430 [<ffffffff814f11f9>] ? perf_event_nmi_handler+0x39/0xb0 [<ffffffff814f2d45>] ? notifier_call_chain+0x55/0x80 [<ffffffff814f2daa>] ? atomic_notifier_call_chain+0x1a/0x20 [<ffffffff81096d0e>] ? notify_die+0x2e/0x30 [<ffffffff814f09c3>] ? do_nmi+0x173/0x2b0 [<ffffffff814f02d0>] ? nmi+0x20/0x30 [<ffffffff814efb3e>] ? _spin_lock+0x1e/0x30 <<EOE>> [<ffffffff8115e89a>] ? cache_alloc_refill+0x8a/0x240 [<ffffffff8115f90f>] ? kmem_cache_alloc+0x15f/0x190 [<ffffffff81145232>] ? anon_vma_prepare+0x122/0x160 [<ffffffff8113c138>] ? handle_pte_fault+0x748/0xb50 [<ffffffff81051ba3>] ? __wake_up+0x53/0x70 [<ffffffff8113c724>] ? handle_mm_fault+0x1e4/0x2b0 [<ffffffff81042c29>] ? __do_page_fault+0x139/0x480 [<ffffffffa0009890>] ? rpc_free_task+0x50/0x80 [sunrpc] [<ffffffffa0009915>] ? rpc_final_put_task+0x55/0x60 [sunrpc] [<ffffffffa0009950>] ? rpc_do_put_task+0x30/0x40 [sunrpc] [<ffffffffa0009990>] ? rpc_put_task+0x10/0x20 [sunrpc] [<ffffffffa0002df8>] ? rpc_call_sync+0x58/0x70 [sunrpc] [<ffffffff814f2c8e>] ? do_page_fault+0x3e/0xa0 [<ffffffff814f0045>] ? page_fault+0x25/0x30 [<ffffffff81110364>] ? file_read_actor+0x44/0x180 [<ffffffff81112746>] ? generic_file_aio_read+0x2d6/0x700 [<ffffffffa00a91da>] ? nfs_file_read+0xca/0x130 [nfs] [<ffffffff8117687a>] ? do_sync_read+0xfa/0x140 [<ffffffff81090d30>] ? autoremove_wake_function+0x0/0x40 [<ffffffff811427ba>] ? do_mmap_pgoff+0x33a/0x380 [<ffffffff8120c836>] ? security_file_permission+0x16/0x20 [<ffffffff81177275>] ? vfs_read+0xb5/0x1a0 [<ffffffff811773b1>] ? sys_read+0x51/0x90 [<ffffffff8100b0f2>] ? system_call_fastpath+0x16/0x1b Kernel panic - not syncing: Watchdog detected hard LOCKUP on cpu 6 Pid: 73, comm: events/6 Tainted: G B D W ---------------- 2.6.32-220.23.1.el6.x86_64 #1 Call Trace: <NMI> [<ffffffff814ecb34>] ? panic+0x78/0x143 [<ffffffff810d91fd>] ? watchdog_overflow_callback+0xcd/0xd0 [<ffffffff8110aaed>] ? __perf_event_overflow+0x9d/0x230 [<ffffffff8110b0a4>] ? perf_event_overflow+0x14/0x20 [<ffffffff8101e216>] ? intel_pmu_handle_irq+0x336/0x550 [<ffffffff814f2716>] ? kprobe_exceptions_notify+0x16/0x430 [<ffffffff814f11f9>] ? perf_event_nmi_handler+0x39/0xb0 [<ffffffff814f2d45>] ? notifier_call_chain+0x55/0x80 [<ffffffff814f2daa>] ? atomic_notifier_call_chain+0x1a/0x20 [<ffffffff81096d0e>] ? notify_die+0x2e/0x30 [<ffffffff814f09c3>] ? do_nmi+0x173/0x2b0 [<ffffffff814f02d0>] ? nmi+0x20/0x30 [<ffffffff814efa63>] ? _spin_lock_irq+0x23/0x40 <<EOE>> [<ffffffff81160553>] ? drain_array+0x73/0x100 [<ffffffff8116156e>] ? cache_reap+0x8e/0x260 [<ffffffff811614e0>] ? cache_reap+0x0/0x260 [<ffffffff8108b3f0>] ? worker_thread+0x170/0x2a0 [<ffffffff81090d30>] ? autoremove_wake_function+0x0/0x40 [<ffffffff8108b280>] ? worker_thread+0x0/0x2a0 [<ffffffff810909c6>] ? kthread+0x96/0xa0 [<ffffffff8100c14a>] ? child_rip+0xa/0x20 [<ffffffff81090930>] ? kthread+0x0/0xa0 [<ffffffff8100c140>] ? child_rip+0x0/0x20 (In reply to comment #19) > I am seeing occasional kernel oopses on our DELL C6220's which seem to be > related to this bug What makes you think it's related to this bug? Note that this bug has been closed for 8 months, so you're really better off filing a new bug, possibly referencing this bug if you think it's related. Thanks. (In reply to comment #19) > I am seeing occasional kernel oopses on our DELL C6220's which seem to be > related to this bug > > ------------[ cut here ]------------ > kernel BUG at mm/slab.c:3067! > invalid opcode: 0000 [#1] SMP Do you still see this issue, or even have a steps to reproduce? thanks |