* [Question] Crash of kmem_cache_cpu->freelist access
@ 2014-12-13 16:06 Gavin Guo
2014-12-15 14:14 ` Christoph Lameter
0 siblings, 1 reply; 2+ messages in thread
From: Gavin Guo @ 2014-12-13 16:06 UTC (permalink / raw)
To: linux-mm, penberg, cl, mpm
Hi all,
I'm currently debugging a bug and found out the problem is the general
protection fault of the following access:
static inline void *get_freepointer(struct kmem_cache *s, void *object)
{
return *(void **)(object + s->offset);
}
I tried to disassembly and found that the object is from c->freelist
and it has an abnormal value which caused the fault. My first thought
is to try to add slub_debug in the kernel command line. But, the
kernel is a production kernel and may not have the chance to add
kernel parameters. The other way is to "echo 1 >
/sys/kernel/slab/<object name>/poison." But, I found the allocation is
bound to kmalloc-1024. So, it may not have a chance to enable the
sysfs poison debugging.
I tried to debug for a long time and can't find any clue. Is there
anyone has efficient debugging methods to deal with the c->freelist
crashing if the slub_debug doesn't have a chance to be added to kernel
parameters.
Really thanks for your time reading the mail.
Thanks,
Tuffkid
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org. For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
^ permalink raw reply [flat|nested] 2+ messages in thread* Re: [Question] Crash of kmem_cache_cpu->freelist access
2014-12-13 16:06 [Question] Crash of kmem_cache_cpu->freelist access Gavin Guo
@ 2014-12-15 14:14 ` Christoph Lameter
0 siblings, 0 replies; 2+ messages in thread
From: Christoph Lameter @ 2014-12-15 14:14 UTC (permalink / raw)
To: Gavin Guo; +Cc: linux-mm, penberg, mpm
On Sun, 14 Dec 2014, Gavin Guo wrote:
> I tried to disassembly and found that the object is from c->freelist
> and it has an abnormal value which caused the fault. My first thought
> is to try to add slub_debug in the kernel command line. But, the
> kernel is a production kernel and may not have the chance to add
> kernel parameters. The other way is to "echo 1 >
the slub_debug option is there so that production kernels *can* run with
debugging and that we can locate these issues.
If you cannot get to a boot prompt then please change the grub
configuration and add the slub_debug parameter.
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org. For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2014-12-15 14:14 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2014-12-13 16:06 [Question] Crash of kmem_cache_cpu->freelist access Gavin Guo
2014-12-15 14:14 ` Christoph Lameter
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox