Re: sysfs_dir_cache slab corruption

From: Greg Kroah-Hartman
Date: Thu Mar 07 2013 - 01:03:03 EST


On Thu, Mar 07, 2013 at 12:33:53AM -0500, Dave Jones wrote:
> And even more sysfs fallout (From a clean boot)..
>
> =============================================================================
> BUG sysfs_dir_cache (Not tainted): Poison overwritten
> -----------------------------------------------------------------------------
>
> Disabling lock debugging due to kernel taint
> INFO: 0xffff8801239a85b8-0xffff8801239a85b8. First byte 0x69 instead of 0x6b
> INFO: Allocated in sysfs_new_dirent+0x59/0x130 age=493166 cpu=3 pid=301
> __slab_alloc+0x4ed/0x584
> kmem_cache_alloc+0x2c0/0x330
> sysfs_new_dirent+0x59/0x130
> sysfs_add_file_mode+0x6b/0x110
> sysfs_add_file+0x12/0x20
> sysfs_create_file+0x26/0x30
> load_module+0x1360/0x28d0
> sys_init_module+0xd7/0x120
> system_call_fastpath+0x16/0x1b
> INFO: Freed in release_sysfs_dirent+0x81/0x100 age=10736 cpu=3 pid=8692
> __slab_free+0x3c/0x3de
> kmem_cache_free+0x362/0x380
> release_sysfs_dirent+0x81/0x100
> sysfs_dir_pos+0x46/0xf0
> sysfs_readdir+0x9a/0x2b0
> vfs_readdir+0xb8/0xf0
> sys_getdents64+0x8f/0x110
> system_call_fastpath+0x16/0x1b
> INFO: Slab 0xffffea00048e6a00 objects=16 used=16 fp=0x (null) flags=0x5000000000004080
> INFO: Object 0xffff8801239a85b8 @offset=1464 fp=0x (null)
>
> Bytes b4 ffff8801239a85a8: 00 00 00 00 00 00 00 00 5a 5a 5a 5a 5a 5a 5a 5a ........ZZZZZZZZ
> Object ffff8801239a85b8: 69 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b ikkkkkkkkkkkkkkk
> Object ffff8801239a85c8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk
> Object ffff8801239a85d8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk
> Object ffff8801239a85e8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk
> Object ffff8801239a85f8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk
> Object ffff8801239a8608: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk
> Object ffff8801239a8618: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk
> Object ffff8801239a8628: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk
> Object ffff8801239a8638: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk
> Object ffff8801239a8648: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b a5 kkkkkkkkkkkkkkk.
> Redzone ffff8801239a8658: bb bb bb bb bb bb bb bb ........
> Padding ffff8801239a8798: 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZ
> Pid: 15728, comm: modprobe Tainted: G B 3.9.0-rc1+ #69
> Call Trace:
> [<ffffffff8118e81d>] ? print_section+0x3d/0x40
> [<ffffffff8118f98e>] print_trailer+0xfe/0x160
> [<ffffffff8118fb2f>] check_bytes_and_report+0xef/0x130
> [<ffffffff81190126>] check_object+0x1c6/0x240
> [<ffffffff81190989>] ? check_slab+0x89/0x130
> [<ffffffff81235159>] ? sysfs_new_dirent+0x59/0x130
> [<ffffffff816bb755>] alloc_debug_processing+0x67/0x109
> [<ffffffff816bc2ee>] __slab_alloc+0x4ed/0x584
> [<ffffffff81235159>] ? sysfs_new_dirent+0x59/0x130
> [<ffffffff811926f0>] kmem_cache_alloc+0x2c0/0x330
> [<ffffffff81235159>] ? sysfs_new_dirent+0x59/0x130
> [<ffffffff81235159>] sysfs_new_dirent+0x59/0x130
> [<ffffffff812343eb>] sysfs_add_file_mode+0x6b/0x110
> [<ffffffff81237620>] internal_create_group+0xd0/0x210
> [<ffffffff81237793>] sysfs_create_group+0x13/0x20
> [<ffffffff810c71f1>] load_module+0x22d1/0x28d0
> [<ffffffff81355570>] ? ddebug_proc_open+0xc0/0xc0
> [<ffffffff810b24ae>] ? put_lock_stats.isra.23+0xe/0x40
> [<ffffffff810c78c7>] sys_init_module+0xd7/0x120
> [<ffffffff816cd942>] system_call_fastpath+0x16/0x1b
> FIX sysfs_dir_cache: Restoring 0xffff8801239a85b8-0xffff8801239a85b8=0x6b
>

Hm, a module was being loaded. Odd, I haven't seen this before, I'm
guessing that 3.8 doesn't show this, right?

greg k-h
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/