Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756041AbZINQ3D (ORCPT ); Mon, 14 Sep 2009 12:29:03 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1753732AbZINQ3B (ORCPT ); Mon, 14 Sep 2009 12:29:01 -0400 Received: from e4.ny.us.ibm.com ([32.97.182.144]:50771 "EHLO e4.ny.us.ibm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751571AbZINQ3A (ORCPT ); Mon, 14 Sep 2009 12:29:00 -0400 Date: Mon, 14 Sep 2009 09:29:02 -0700 From: "Paul E. McKenney" To: Linus Torvalds Cc: Ingo Molnar , Eric Paris , Pekka Enberg , Jens Axboe , James Morris , Thomas Liu , linux-kernel@vger.kernel.org Subject: Re: [origin tree SLAB corruption] BUG kmalloc-64: Poison overwritten, INFO: Allocated in bdi_alloc_work+0x2b/0x100 age=175 cpu=1 pid=3514 Message-ID: <20090914162902.GF6773@linux.vnet.ibm.com> Reply-To: paulmck@linux.vnet.ibm.com References: <20090912072450.GA6767@elte.hu> <1252808939.13780.30.camel@dhcp231-106.rdu.redhat.com> <20090914071631.GA24801@elte.hu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.15+20070412 (2007-04-11) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2196 Lines: 48 On Mon, Sep 14, 2009 at 07:40:27AM -0700, Linus Torvalds wrote: > > > On Mon, 14 Sep 2009, Ingo Molnar wrote: > > > > BUG kmalloc-64: Poison overwritten > > ----------------------------------------------------------------------------- > > > > INFO: 0xf498f6a0-0xf498f6a7. First byte 0x90 instead of 0x6b > > INFO: Allocated in bdi_alloc_work+0x2b/0x100 age=175 cpu=1 pid=3514 > > INFO: Freed in bdi_work_free+0x45/0x60 age=9 cpu=1 pid=3509 > > INFO: Slab 0xc3257d84 objects=36 used=11 fp=0xf498f690 flags=0x400000c3 > > INFO: Object 0xf498f690 @offset=1680 fp=0xf498fe00 > > > > Bytes b4 0xf498f680: ab 0d 00 00 9c 27 ff ff 5a 5a 5a 5a 5a 5a 5a 5a ?....'??ZZZZZZZZ > > Object 0xf498f690: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk > > Object 0xf498f6a0: 90 f3 98 f4 60 3c 11 c1 6b 6b 6b 6b 6b 6b 6b 6b .?.?`<.?kkkkkkkk > > That's 8 bytes of 0xf498f398 and 0xc1113c60. Doesn't look like much, but > they're both valid kernel pointers, and the 0xf498f398 one is actually > into the same page as the corruption, so it's a pointer to the same slab > type (or at least same size). Which is a good hint in itself: we're > looking at a list or something. > > And it's at offset 16 in the structure. > > That's almost certainly a "struct bdi_work", and the use-aftr-free thing > is the "struct rcu_head rcu_head" part of it. That first thing (pointer to > the same page) is 'next', and the second thing is a pointer to kernel text > (and I can pretty much guarantee that 0xc1113c60 is 'bdi_work_free'). > > So this is either a fs/fs-writeback.c bug, or it's a problem with RCU. > Both of them are new or hugely changed since 2.6.31. If this run had used CONFIG_TREE_PREEMPT_RCU rather than the CONFIG_TREE_RCU that it actually had used, I would suggest applying the patchset I submitted yesterday (Sept 13). http://thread.gmane.org/gmane.linux.kernel/888803 Will take a look, regardless. Thanx, Paul -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/