From: Andrew Morton <akpm@linux-foundation.org>
To: casteyde.christian@free.fr
Cc: bugzilla-daemon@bugzilla.kernel.org, linux-mm@kvack.org,
Pekka Enberg <penberg@cs.helsinki.fi>,
Vegard Nossum <vegardno@ifi.uio.no>
Subject: Re: [Bug 42202] New: Caught 64-bit read from uninitialized memory in kmem_cache_alloc
Date: Thu, 1 Sep 2011 12:50:45 -0700 [thread overview]
Message-ID: <20110901125045.aba23d9f.akpm@linux-foundation.org> (raw)
In-Reply-To: <bug-42202-27@https.bugzilla.kernel.org/>
(switched to email. Please respond via emailed reply-to-all, not via the
bugzilla web interface).
On Thu, 1 Sep 2011 17:15:00 GMT
bugzilla-daemon@bugzilla.kernel.org wrote:
> https://bugzilla.kernel.org/show_bug.cgi?id=42202
>
> Summary: Caught 64-bit read from uninitialized memory in
> kmem_cache_alloc
I'm really struggling with this one.
> Product: Memory Management
> Version: 2.5
> Kernel Version: 3.1-rc4
> Platform: All
> OS/Version: Linux
> Tree: Mainline
> Status: NEW
> Severity: normal
> Priority: P1
> Component: Page Allocator
> AssignedTo: akpm@linux-foundation.org
> ReportedBy: casteyde.christian@free.fr
> Regression: Yes
>
>
> Acer Aspire 7750G
> Core i7 in 64bits mode
> Slackware64 13.37
> kmemcheck configured
>
> Since 3.1-rc4, I have the following warning at boot:
>
> udev[1745]: renamed network interface eth0 to eth1
> udev[1699]: renamed network interface wlan0-eth0 to eth0
> WARNING: kmemcheck: Caught 64-bit read from uninitialized memory
> (ffff8801c11865d0)
> 000110000000adde000220000000addee06d18c10188ffff403d27c20188ffff
> f f f f f f f f f f f f f f f f u u u u u u u u u u u u u u u u
> ^
>
> Pid: 1700, comm: udevd Tainted: G W 3.1.0-rc4 #13 Acer Aspire
> 7750G/JE70_HR
> RIP: 0010:[<ffffffff8111aea6>] [<ffffffff8111aea6>]
> kmem_cache_alloc+0x66/0x120
> RSP: 0018:ffff8801c2103b38 EFLAGS: 00010246
> RAX: 0000000000000000 RBX: ffff8801c23f6d10 RCX: 0000000000062720
> RDX: 0000000000062718 RSI: 00000000001d43a0 RDI: 00000000000000d0
> RBP: ffff8801c2103b68 R08: ffff8801c2109300 R09: 0000000000000001
> R10: ffff8801c2109300 R11: 0000000000000000 R12: ffff8801c11865d0
> R13: ffff8801c7414400 R14: 00000000000000d0 R15: ffffffff8110519f
> FS: 00007fec4c108720(0000) GS:ffff8801c7800000(0000) knlGS:0000000000000000
> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> CR2: ffff8801c604a0b0 CR3: 00000001c20f9000 CR4: 00000000000406f0
> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> DR3: 0000000000000000 DR6: 00000000ffff4ff0 DR7: 0000000000000400
> [<ffffffff8110519f>] anon_vma_prepare+0x5f/0x190
> [<ffffffff810fb0b6>] handle_pte_fault+0x576/0x790
> [<ffffffff810fc5ff>] handle_mm_fault+0x11f/0x1c0
> [<ffffffff810575d2>] do_page_fault+0x142/0x490
> [<ffffffff817db57f>] page_fault+0x1f/0x30
> [<ffffffff811858a0>] sysfs_read_file+0xf0/0x1a0
> [<ffffffff8112166a>] vfs_read+0xaa/0x160
> [<ffffffff81121768>] sys_read+0x48/0x90
> [<ffffffff817dbabb>] system_call_fastpath+0x16/0x1b
> [<ffffffffffffffff>] 0xffffffffffffffff
> Adding 2097148k swap on /dev/sda1. Priority:-1 extents:1 across:2097148k
> EXT4-fs (sda2): re-mounted. Opts: (null)
>
> I do not know if it occurs with previous rc of 3.1, but I don't have it with
> 3.0.
It seems to be saying that the read occurred within kmem_cache_alloc().
Or is the stack trace off-by-one, and the read is occurring in
anon_vma_prepare()?
Could you please take a look at the very nice
Documentation/kmemcheck.txt and use the info in there to work out the
exact file and line where the read is occurring? The "addr2line"
operation.
I'm having trojuble working out if your kernel is using slab or slub.
This happens to me quite often. Pekka, perhaps we should add this info
to the "Pid: 1700, comm: udevd Tainted: G W 3.1.0-rc4 #13 Acer Aspire"
line. Or remove a few of our sl*b implementations...
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org. For more info on Linux MM,
see: http://www.linux-mm.org/ .
Fight unfair telecom internet charges in Canada: sign http://stopthemeter.ca/
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
next parent reply other threads:[~2011-09-01 19:52 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <bug-42202-27@https.bugzilla.kernel.org/>
2011-09-01 19:50 ` Andrew Morton [this message]
2011-09-02 11:19 ` Christian Casteyde
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20110901125045.aba23d9f.akpm@linux-foundation.org \
--to=akpm@linux-foundation.org \
--cc=bugzilla-daemon@bugzilla.kernel.org \
--cc=casteyde.christian@free.fr \
--cc=linux-mm@kvack.org \
--cc=penberg@cs.helsinki.fi \
--cc=vegardno@ifi.uio.no \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox