各路大侠帮看看这个panic ,小弟新手,已蒙!
自己编写的内核模块所致.<2>kernel BUG at mm/slab.c:3069!
<4>invalid opcode: 0000 [#1] SMP
<4>last sysfs file: /sys/devices/virtual/block/dm-2/uevent
<4>CPU 0
<4>Modules linked in: monitor(U) vfat fat lp autofs4 sunrpc 8021q garp stp llc ipt_REJECT nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter ip_tables ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 xt_state nf_conntrack ip6table_filter ip6_tables ipv6 fuse vmhgfs(U) vsock(U) ppdev parport_pc parport snd_ens1371 snd_rawmidi snd_ac97_codec ac97_bus snd_seq snd_seq_device snd_pcm snd_timer snd soundcore snd_page_alloc e1000 microcode vmware_balloon sg vmci(U) i2c_piix4 i2c_core shpchp uinput ext4 mbcache jbd2 usb_storage sd_mod crc_t10dif sr_mod cdrom mptspi mptscsih mptbase scsi_transport_spi pata_acpi ata_generic ata_piix dm_mirror dm_region_hash dm_log dm_mod
<4>
<4>Pid: 5029, comm: gnome-screensav Tainted: G W--------------- 2.6.32-358.11.1.2.ky3.1.x86_64 #1 VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform
<4>RIP: 0010:[<ffffffff811673a4>][<ffffffff811673a4>] cache_alloc_refill+0x1e4/0x240
<4>RSP: 0018:ffff8800156a1dd8EFLAGS: 00010046
<4>RAX: 000000000000002f RBX: ffff88003f800040 RCX: 0000000000000070
<4>RDX: ffff88003dbc1000 RSI: ffff88003f822440 RDI: ffff88003bd33000
<4>RBP: ffff8800156a1e38 R08: ffff88003dbc1000 R09: 000000000000000d
<4>R10: 00000000000000a0 R11: 0000000000000000 R12: ffff88003fabe800
<4>R13: ffff88003f822440 R14: 000000000000002f R15: ffff88003bd33000
<4>FS:00007fd94fd21920(0000) GS:ffff880013c00000(0000) knlGS:0000000000000000
<4>CS:0010 DS: 0000 ES: 0000 CR0: 0000000080050033
<4>CR2: 0000000001210008 CR3: 00000000157c1000 CR4: 00000000000007f0
<4>DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
<4>DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
<4>Process gnome-screensav (pid: 5029, threadinfo ffff8800156a0000, task ffff88003acb4ae0)
<4>Stack:
<4> 00000000ffffff9c 0000000000000001 ffff88003f822480 000412d08118f281
<4><d> ffff88003f822460 ffff88003f822450 ffff8800156a1f28 0000000000000018
<4><d> 0000000000000010 00000000000000d0 ffff88003f800040 ffffffff8113a0d9
<4>Call Trace:
<4> [<ffffffff8113a0d9>] ? kmemdup+0x29/0x50
<4> [<ffffffff81168289>] __kmalloc+0x1a9/0x220
<4> [<ffffffff8113a0d9>] kmemdup+0x29/0x50
<4> [<ffffffff81226f6f>] selinux_cred_prepare+0x1f/0x40
<4> [<ffffffff8121be46>] security_prepare_creds+0x16/0x20
<4> [<ffffffff8109e3ef>] prepare_creds+0x8f/0xb0
<4> [<ffffffff8117edf9>] sys_faccessat+0x59/0x1d0
<4> [<ffffffff8117ef88>] sys_access+0x18/0x20
<4> [<ffffffff8100b072>] system_call_fastpath+0x16/0x1b
<4>Code: 89 ff e8 70 1c 12 00 eb 99 66 0f 1f 44 00 00 41 c7 45 60 01 00 00 00 4d 8b 7d 20 4c 39 7d c0 0f 85 f2 fe ff ff eb 84 0f 0b eb fe <0f> 0b 66 2e 0f 1f 84 00 00 00 00 00 eb f4 8b 55 ac 8b 75 bc 31
<1>RIP[<ffffffff811673a4>] cache_alloc_refill+0x1e4/0x240
<4> RSP <ffff8800156a1dd8>
走查代码,确认代码中可能涉及slab的操作是否规范。 回复 2# humjb_1983
哪里能涉及 slab 呢, 是我kmalloc , kfree, 还是 我代码中的netlink skb的申请和释放呢
你的kmalloc , kfree,netlink skb的申请和释放,都是基于slab,只有走查代码先了。
页:
[1]