Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755802AbZINRKk (ORCPT ); Mon, 14 Sep 2009 13:10:40 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1755651AbZINRKf (ORCPT ); Mon, 14 Sep 2009 13:10:35 -0400 Received: from brick.kernel.dk ([93.163.65.50]:51717 "EHLO kernel.dk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754852AbZINRKf (ORCPT ); Mon, 14 Sep 2009 13:10:35 -0400 Date: Mon, 14 Sep 2009 19:10:37 +0200 From: Jens Axboe To: "Paul E. McKenney" Cc: Linus Torvalds , Ingo Molnar , Eric Paris , Pekka Enberg , James Morris , Thomas Liu , linux-kernel@vger.kernel.org Subject: Re: [origin tree SLAB corruption] BUG kmalloc-64: Poison overwritten, INFO: Allocated in bdi_alloc_work+0x2b/0x100 age=175 cpu=1 pid=3514 Message-ID: <20090914171037.GG14984@kernel.dk> References: <20090912072450.GA6767@elte.hu> <1252808939.13780.30.camel@dhcp231-106.rdu.redhat.com> <20090914071631.GA24801@elte.hu> <20090914162902.GF6773@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20090914162902.GF6773@linux.vnet.ibm.com> Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2456 Lines: 56 On Mon, Sep 14 2009, Paul E. McKenney wrote: > On Mon, Sep 14, 2009 at 07:40:27AM -0700, Linus Torvalds wrote: > > > > > > On Mon, 14 Sep 2009, Ingo Molnar wrote: > > > > > > BUG kmalloc-64: Poison overwritten > > > ----------------------------------------------------------------------------- > > > > > > INFO: 0xf498f6a0-0xf498f6a7. First byte 0x90 instead of 0x6b > > > INFO: Allocated in bdi_alloc_work+0x2b/0x100 age=175 cpu=1 pid=3514 > > > INFO: Freed in bdi_work_free+0x45/0x60 age=9 cpu=1 pid=3509 > > > INFO: Slab 0xc3257d84 objects=36 used=11 fp=0xf498f690 flags=0x400000c3 > > > INFO: Object 0xf498f690 @offset=1680 fp=0xf498fe00 > > > > > > Bytes b4 0xf498f680: ab 0d 00 00 9c 27 ff ff 5a 5a 5a 5a 5a 5a 5a 5a ?....'??ZZZZZZZZ > > > Object 0xf498f690: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk > > > Object 0xf498f6a0: 90 f3 98 f4 60 3c 11 c1 6b 6b 6b 6b 6b 6b 6b 6b .?.?`<.?kkkkkkkk > > > > That's 8 bytes of 0xf498f398 and 0xc1113c60. Doesn't look like much, but > > they're both valid kernel pointers, and the 0xf498f398 one is actually > > into the same page as the corruption, so it's a pointer to the same slab > > type (or at least same size). Which is a good hint in itself: we're > > looking at a list or something. > > > > And it's at offset 16 in the structure. > > > > That's almost certainly a "struct bdi_work", and the use-aftr-free thing > > is the "struct rcu_head rcu_head" part of it. That first thing (pointer to > > the same page) is 'next', and the second thing is a pointer to kernel text > > (and I can pretty much guarantee that 0xc1113c60 is 'bdi_work_free'). > > > > So this is either a fs/fs-writeback.c bug, or it's a problem with RCU. > > Both of them are new or hugely changed since 2.6.31. > > If this run had used CONFIG_TREE_PREEMPT_RCU rather than the > CONFIG_TREE_RCU that it actually had used, I would suggest applying the > patchset I submitted yesterday (Sept 13). > > http://thread.gmane.org/gmane.linux.kernel/888803 Ingo, did it? I'll dive into this tonight, Linus' analysis and just a general feel does point in the direction of the bdi work. > Will take a look, regardless. Thanks! -- Jens Axboe -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/