J have similar problem witch stability, but under heavy network load. Some minutes after Oups machine unexpectivly reboted....
[ 9879.390659] kernel BUG at /build/buildd/linux-3.2.0/mm/slub.c:3427! [ 9879.391620] invalid opcode: 0000 [#1] SMP [ 9879.392056] CPU 0 [ 9879.392056] Modules linked in: xenfs ip6table_filter ip6_tables ebtable_nat ebtables ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp iptable_filter ip_tables x_tables ib_iser rdma_cm ib_cm iw_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi psmouse dm_multipath sata_svw serio_raw k8temp amd64_edac_mod pata_serverworks edac_core edac_mce_amd mac_hid i2c_piix4 xgifb(C) shpchp softdog lp parport nfsd nfs lockd fscache auth_rpcgss nfs_acl sunrpc dm_mirror dm_region_hash dm_raid45 dm_log xor bridge xen_evtchn xen_netback xen_gntdev igb(O) e100 tg3 e1000 e1000e dca 8021q garp stp sata_mv xen_blkback mptsas mptscsih mptbase i2o_block i2o_core aic7xxx scsi_transport_sas megaraid_mbox megaraid_mm pata_oldpiix pata_mpiix aacraid 3w_9xxx [ 9879.392056] [ 9879.392056] Pid: 3283, comm: ssh Tainted: G C O 3.2.0-26-generic #41-Ubuntu To Be Filled By O.E.M. To Be Filled By O.E.M./TYAN Transport GT20 B3870 [ 9879.392056] RIP: e030:[<ffffffff81162425>] [<ffffffff81162425>] kfree+0x135/0x140 [ 9879.392056] RSP: e02b:ffff880034bb5ad8 EFLAGS: 00010246 [ 9879.392056] RAX: 0100000000000000 RBX: ffff880033c55000 RCX: ffff880033c55000 [ 9879.392056] RDX: ffffffff7fffffff RSI: ffff880033c55e2a RDI: ffff880033c55000 [ 9879.392056] RBP: ffff880034bb5b08 R08: ffffea0000cf1540 R09: 0000000000000000 [ 9879.392056] R10: ffff880033b357c0 R11: 0000000000000b68 R12: ffff88003381f800 [ 9879.392056] R13: ffff880033b35830 R14: ffffffff815337e0 R15: 0000000000000000 [ 9879.392056] FS: 00007fac04a647c0(0000) GS:ffff88003fc00000(0000) knlGS:0000000000000000 [ 9879.392056] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b [ 9879.392056] CR2: 00007fac0698e000 CR3: 00000000354ab000 CR4: 0000000000000660 [ 9879.392056] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 9879.392056] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 9879.392056] Process ssh (pid: 3283, threadinfo ffff880034bb4000, task ffff880002cd2de0) [ 9879.392056] Stack: [ 9879.392056] ffff880034bb5b28 ffff88003381f800 ffff88003381f800 ffff880033b35830 [ 9879.392056] ffffffff815337cb 0000000000000000 ffff880034bb5b28 ffffffff815337e0 [ 9879.392056] ffff88003381f800 ffff88003381f800 ffff880034bb5b38 ffffffff81533845 [ 9879.392056] Call Trace: [ 9879.392056] [<ffffffff815337cb>] ? skb_release_data.part.45+0xab/0xd0 [ 9879.392056] [<ffffffff815337e0>] skb_release_data.part.45+0xc0/0xd0 [ 9879.392056] [<ffffffff81533845>] skb_release_data+0x55/0x60 [ 9879.392056] [<ffffffff8153386e>] __kfree_skb+0x1e/0x30 [ 9879.392056] [<ffffffff81533975>] kfree_skb+0x45/0xc0 [ 9879.392056] [<ffffffff815337cb>] skb_release_data.part.45+0xab/0xd0 [ 9879.392056] [<ffffffff81533845>] skb_release_data+0x55/0x60 [ 9879.392056] [<ffffffff8153386e>] __kfree_skb+0x1e/0x30 [ 9879.392056] [<ffffffff815859d6>] tcp_recvmsg+0xaf6/0xba0 [ 9879.392056] [<ffffffff8105fa7e>] ? try_to_wake_up+0x18e/0x200 [ 9879.392056] [<ffffffff8105fb02>] ? default_wake_function+0x12/0x20 [ 9879.392056] [<ffffffff815a94db>] inet_recvmsg+0x6b/0x80 [ 9879.392056] [<ffffffff8104c2e8>] ? __wake_up_common+0x58/0x90 [ 9879.392056] [<ffffffff815295fc>] do_sock_read.isra.12+0xdc/0xf0 [ 9879.392056] [<ffffffff81529667>] sock_aio_read.part.13+0x57/0x80 [ 9879.392056] [<ffffffff810050d1>] ? xen_mc_extend_args+0x111/0x150 [ 9879.392056] [<ffffffff815296bd>] sock_aio_read+0x2d/0x40 [ 9879.392056] [<ffffffff81177782>] do_sync_read+0xd2/0x110 [ 9879.392056] [<ffffffff81004d32>] ? xen_mc_flush+0xb2/0x1c0 [ 9879.392056] [<ffffffff8129d003>] ? security_file_permission+0x93/0xb0 [ 9879.392056] [<ffffffff81177c01>] ? rw_verify_area+0x61/0xf0 [ 9879.392056] [<ffffffff81178195>] vfs_read+0x165/0x180 [ 9879.392056] [<ffffffff811781fa>] sys_read+0x4a/0x90 [ 9879.392056] [<ffffffff81661fc2>] system_call_fastpath+0x16/0x1b [ 9879.392056] Code: 89 da 4c 89 c6 e8 dc 32 4e 00 eb 94 49 f7 00 00 c0 00 00 74 16 4c 89 c7 e8 29 18 fc ff e9 7e ff ff ff 4d 8b 40 30 e9 27 ff ff ff <0f> 0b 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 53 48 83 ec 08 66 [ 9879.392056] RIP [<ffffffff81162425>] kfree+0x135/0x140 [ 9879.392056] RSP <ffff880034bb5ad8> [ 9880.214144] ---[ end trace 260f959c94593647 ]--- -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1003624 Title: kernel BUG at /build/buildd/linux-3.2.0/mm/slub.c:3427!; EIP is at kfree+0x10f/0x120 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1003624/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
