Hello, While testing kernel 3.14-rc3 I noticed the call stack below. Had anyone else perhaps already noticed this ? The test I ran was to change the mlx4 port type a few times while the ib_ipoib kernel module was loaded.
Thanks, Bart. ============================================================================= BUG kmalloc-1024 (Tainted: G B D ): Poison overwritten ----------------------------------------------------------------------------- INFO: 0xffff880817841ab0-0xffff880817841ab0. First byte 0x6a instead of 0x6b INFO: Allocated in ib_umad_add_one+0x6e/0x4f0 [ib_umad] age=43184 cpu=0 pid=3820 __slab_alloc+0x448/0x4fa __kmalloc+0x1f7/0x2b0 ib_umad_add_one+0x6e/0x4f0 [ib_umad] ib_register_device+0x424/0x4e0 [ib_core] mlx4_ib_add+0x8b4/0x10c0 [mlx4_ib] mlx4_add_device+0x3d/0x90 [mlx4_core] mlx4_register_device+0x5b/0x90 [mlx4_core] mlx4_change_port_types+0x119/0x160 [mlx4_core] set_port_type+0x1cc/0x270 [mlx4_core] dev_attr_store+0x18/0x30 sysfs_kf_write+0x44/0x60 kernfs_fop_write+0xd5/0x150 vfs_write+0xba/0x1e0 SyS_write+0x49/0xa0 tracesys+0xd0/0xd5 INFO: Freed in ib_umad_close+0x130/0x140 [ib_umad] age=0 cpu=5 pid=5141 __slab_free+0x3c/0x29e kfree+0x250/0x290 ib_umad_close+0x130/0x140 [ib_umad] __fput+0xea/0x230 ____fput+0xe/0x10 task_work_run+0xac/0xe0 do_notify_resume+0x9f/0xc0 int_signal+0x12/0x17 INFO: Slab 0xffffea00205e1000 objects=24 used=24 fp=0x (null) flags=0x2000000000004080 INFO: Object 0xffff880817841a68 @offset=6760 fp=0xffff8808178469a0 -- To unsubscribe from this list: send the line "unsubscribe linux-rdma" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html