Received: by 10.192.165.156 with SMTP id m28csp218874imm; Tue, 17 Apr 2018 09:01:46 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+ap5B1tcngBc4Ng1Giub2XSco25+IA/nUF5RNu47Nc1s1GCejnw79oHZzoubZwm1yPhkKI X-Received: by 10.99.39.135 with SMTP id n129mr2247501pgn.167.1523980906515; Tue, 17 Apr 2018 09:01:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523980906; cv=none; d=google.com; s=arc-20160816; b=0tC0Uaey6erqfofXCMqSBJ9/PA9ZmZDIb4DyO1d4RAE9EigvjNeCRBf7uyu1UTzNpv 9QdKSln0byXoJcxLml/CnNorO2OXjvMsVVG3z5PpeslHExnHwvhY4DBowHV5ux4xTBlM QdtbNCqJgDSoDb9da48LZrRfNwU5SxCO//BLnYCza0o1AY63jFmBRXFxWTjuxjl5AJQT Kd9AhfGaZFWFVAnqIXz8ZmDejGGEzmr896CIcwXB61xP6BTVZJVUC0eD5G8drLOvLRaQ HGI6O0/aD9Y83LlzsiYbeLtlO4FUtlt6EWgjRdeZMoUC9K7K0aHGaZFXqBL+oGCa4v2O MVvA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date :arc-authentication-results; bh=l+eemrpP5D7YMYbcqrFsYT7CXN0FQ6PMF4fPoN+e3rM=; b=LrBMYKuID+UIbCViOcCFsrewyIvVF61ZsZXlIK/tEpui2ETeqWlcf7+5hgFBt3Km6c GvrmUz7eIq90n4CSJcm+34JicqcmxHlAQPK4s52f5JESj10vUrzB/mPaeteCoexCAap3 yF024fzOOJlI9Fx/bBtgTs0vmZVNfkH3XirfvG5eDH3OBcAHsUHaEzhF6JYBNkuGAByl Jcpr/Bk0Pb6NDKER5DxNqOH00AbEbpPOJa26fSnXeyLXUcNnvudgkzQRD+8higLIEH1r H6f2PmazDhxkxWPxgHpG7inxpby4FGhxOsec251nvPdBI0eVbbQz28lx1KzS73RzHxxb h3Zg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b3-v6si14857624pld.2.2018.04.17.09.01.31; Tue, 17 Apr 2018 09:01:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753126AbeDQP6E (ORCPT + 99 others); Tue, 17 Apr 2018 11:58:04 -0400 Received: from mx2.suse.de ([195.135.220.15]:36238 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751187AbeDQP6C (ORCPT ); Tue, 17 Apr 2018 11:58:02 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 792A5AF7B; Tue, 17 Apr 2018 15:58:01 +0000 (UTC) Received: by quack2.suse.cz (Postfix, from userid 1000) id 50E411E0531; Tue, 17 Apr 2018 17:58:01 +0200 (CEST) Date: Tue, 17 Apr 2018 17:58:01 +0200 From: Jan Kara To: Pavlos Parissis Cc: Jan Kara , mszeredi@redhat.com, amir73il@gmail.com, linux-kernel@vger.kernel.org, stable@vger.kernel.org Subject: Re: kernel 4.14.x crash around fsnotify_mark_connector Message-ID: <20180417155801.y4boo2nnoznn6sg6@quack2.suse.cz> References: <20180417140231.75fi4ek2q77qilta@quack2.suse.cz> <3016af7f-97f0-e28d-96cd-e49fada3e88d@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <3016af7f-97f0-e28d-96cd-e49fada3e88d@gmail.com> User-Agent: NeoMutt/20170421 (1.8.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue 17-04-18 16:15:07, Pavlos Parissis wrote: > On 17/04/2018 04:02 μμ, Jan Kara wrote: > > On Tue 17-04-18 12:39:32, Pavlos Parissis wrote: > >> In one of our production servers where we run kernel version 4.14.32, I noticed > >> the following: > > > > OK, I was looking into this for some time and couldn't find a problem in > > 4.14.32 code. Can you try running a kernel with CONFIG_DEBUG_SLAB and > > CONFIG_DEBUG_PAGEALLOC enabled to hopefully catch the problem earlier? > > Thanks! > > > > I can certainly do that, but I can't reproduce that specific crash. So, > it may take days before we get a similar crash. Having said that, the > soft lockup issue, which I mentioned in another thread, happens once per > day, so I hope running a kernel with those debug settings will help you. Yes, the hope is debug checks will trigger faster than the actual data corruption (or softlockup) you've hit. Honza -- Jan Kara SUSE Labs, CR