Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751279Ab3CGFeA (ORCPT ); Thu, 7 Mar 2013 00:34:00 -0500 Received: from mx1.redhat.com ([209.132.183.28]:10109 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750800Ab3CGFd7 (ORCPT ); Thu, 7 Mar 2013 00:33:59 -0500 Date: Thu, 7 Mar 2013 00:33:53 -0500 From: Dave Jones To: Linux Kernel Cc: Greg Kroah-Hartman Subject: sysfs_dir_cache slab corruption Message-ID: <20130307053353.GA24287@redhat.com> Mail-Followup-To: Dave Jones , Linux Kernel , Greg Kroah-Hartman References: <20130307052854.GA23745@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20130307052854.GA23745@redhat.com> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3759 Lines: 73 And even more sysfs fallout (From a clean boot).. ============================================================================= BUG sysfs_dir_cache (Not tainted): Poison overwritten ----------------------------------------------------------------------------- Disabling lock debugging due to kernel taint INFO: 0xffff8801239a85b8-0xffff8801239a85b8. First byte 0x69 instead of 0x6b INFO: Allocated in sysfs_new_dirent+0x59/0x130 age=493166 cpu=3 pid=301 __slab_alloc+0x4ed/0x584 kmem_cache_alloc+0x2c0/0x330 sysfs_new_dirent+0x59/0x130 sysfs_add_file_mode+0x6b/0x110 sysfs_add_file+0x12/0x20 sysfs_create_file+0x26/0x30 load_module+0x1360/0x28d0 sys_init_module+0xd7/0x120 system_call_fastpath+0x16/0x1b INFO: Freed in release_sysfs_dirent+0x81/0x100 age=10736 cpu=3 pid=8692 __slab_free+0x3c/0x3de kmem_cache_free+0x362/0x380 release_sysfs_dirent+0x81/0x100 sysfs_dir_pos+0x46/0xf0 sysfs_readdir+0x9a/0x2b0 vfs_readdir+0xb8/0xf0 sys_getdents64+0x8f/0x110 system_call_fastpath+0x16/0x1b INFO: Slab 0xffffea00048e6a00 objects=16 used=16 fp=0x (null) flags=0x5000000000004080 INFO: Object 0xffff8801239a85b8 @offset=1464 fp=0x (null) Bytes b4 ffff8801239a85a8: 00 00 00 00 00 00 00 00 5a 5a 5a 5a 5a 5a 5a 5a ........ZZZZZZZZ Object ffff8801239a85b8: 69 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b ikkkkkkkkkkkkkkk Object ffff8801239a85c8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk Object ffff8801239a85d8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk Object ffff8801239a85e8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk Object ffff8801239a85f8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk Object ffff8801239a8608: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk Object ffff8801239a8618: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk Object ffff8801239a8628: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk Object ffff8801239a8638: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk Object ffff8801239a8648: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b a5 kkkkkkkkkkkkkkk. Redzone ffff8801239a8658: bb bb bb bb bb bb bb bb ........ Padding ffff8801239a8798: 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZ Pid: 15728, comm: modprobe Tainted: G B 3.9.0-rc1+ #69 Call Trace: [] ? print_section+0x3d/0x40 [] print_trailer+0xfe/0x160 [] check_bytes_and_report+0xef/0x130 [] check_object+0x1c6/0x240 [] ? check_slab+0x89/0x130 [] ? sysfs_new_dirent+0x59/0x130 [] alloc_debug_processing+0x67/0x109 [] __slab_alloc+0x4ed/0x584 [] ? sysfs_new_dirent+0x59/0x130 [] kmem_cache_alloc+0x2c0/0x330 [] ? sysfs_new_dirent+0x59/0x130 [] sysfs_new_dirent+0x59/0x130 [] sysfs_add_file_mode+0x6b/0x110 [] internal_create_group+0xd0/0x210 [] sysfs_create_group+0x13/0x20 [] load_module+0x22d1/0x28d0 [] ? ddebug_proc_open+0xc0/0xc0 [] ? put_lock_stats.isra.23+0xe/0x40 [] sys_init_module+0xd7/0x120 [] system_call_fastpath+0x16/0x1b FIX sysfs_dir_cache: Restoring 0xffff8801239a85b8-0xffff8801239a85b8=0x6b -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/