From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756099Ab2GJP6v (ORCPT ); Tue, 10 Jul 2012 11:58:51 -0400 Received: from mx1.redhat.com ([209.132.183.28]:50922 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753501Ab2GJP6t (ORCPT ); Tue, 10 Jul 2012 11:58:49 -0400 Date: Tue, 10 Jul 2012 11:58:40 -0400 From: Dave Jones To: Herbert Xu Cc: Linux Kernel Subject: 3.5rc6 cryptomgr_test slab corruption.. Message-ID: <20120710155840.GA23882@redhat.com> Mail-Followup-To: Dave Jones , Herbert Xu , Linux Kernel MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ============================================================================= BUG kmalloc-32 (Not tainted): Invalid object pointer 0xffff8801054f6600 ----------------------------------------------------------------------------- INFO: Slab 0xffffea0004153d00 objects=45 used=37 fp=0xffff8801054f5ab8 flags=0x20000000004081 Pid: 22220, comm: cryptomgr_test Not tainted 3.5.0-rc6+ #100 Call Trace: [] slab_err+0xaf/0xd0 [] ? slab_pad_check.part.38+0xc6/0x170 [] ? free_debug_processing+0x2c/0x1ea [] free_debug_processing+0x70/0x1ea [] ? rfc4106_set_key+0x12a/0x320 [] ? rfc4106_set_key+0x12a/0x320 [] __slab_free+0x3d/0x254 [] ? debug_check_no_obj_freed+0x16c/0x210 [] ? rfc4106_set_key+0x12a/0x320 [] ? rfc4106_set_key+0x12a/0x320 [] kfree+0x269/0x270 [] rfc4106_set_key+0x12a/0x320 [] test_aead+0x50e/0xe50 [] ? trace_hardirqs_on+0xd/0x10 [] ? __slab_alloc+0x472/0x4c4 [] ? __crypto_alloc_tfm+0x52/0x170 [] ? __crypto_alloc_tfm+0x76/0x170 [] ? crypto_spawn_tfm+0x4c/0x90 [] ? __kmalloc+0x27f/0x290 [] ? cryptd_aead_init_tfm+0x2b/0x50 [] ? __crypto_alloc_tfm+0xf9/0x170 [] ? crypto_alloc_aead+0x6b/0xc0 [] ? cryptd_alloc_aead+0x76/0xb0 [] ? rfc4106_init+0x47/0x80 [] ? __crypto_alloc_tfm+0xf9/0x170 [] ? crypto_spawn_tfm+0x4c/0x90 [] alg_test_aead+0x52/0xc0 [] alg_test+0x100/0x320 [] ? __schedule+0x462/0x9d0 [] ? cryptomgr_probe+0xf0/0xf0 [] cryptomgr_test+0x45/0x50 [] kthread+0xb7/0xc0 [] ? sub_preempt_count+0x79/0xd0 [] kernel_thread_helper+0x4/0x10 [] ? finish_task_switch+0x7c/0x120 [] ? _raw_spin_unlock_irq+0x3b/0x60 [] ? retint_restore_args+0xe/0xe [] ? flush_kthread_worker+0x190/0x190 [] ? gs_change+0xb/0xb FIX kmalloc-32: Object at 0xffff8801054f6600 not freed ============================================================================= BUG kmalloc-32 (Not tainted): Invalid object pointer 0xffff8801054f5ac0 ----------------------------------------------------------------------------- INFO: Slab 0xffffea0004153d00 objects=45 used=38 fp=0xffff8801054f6490 flags=0x20000000004081 Pid: 22220, comm: cryptomgr_test Not tainted 3.5.0-rc6+ #100 Call Trace: [] slab_err+0xaf/0xd0 [] ? slab_pad_check.part.38+0xc6/0x170 [] ? free_debug_processing+0x2c/0x1ea [] free_debug_processing+0x70/0x1ea [] ? rfc4106_set_key+0x12a/0x320 [] ? rfc4106_set_key+0x12a/0x320 [] __slab_free+0x3d/0x254 [] ? debug_check_no_obj_freed+0x16c/0x210 [] ? rfc4106_set_key+0x12a/0x320 [] ? rfc4106_set_key+0x12a/0x320 [] kfree+0x269/0x270 [] rfc4106_set_key+0x12a/0x320 [] test_aead+0x50e/0xe50 [] ? trace_hardirqs_on+0xd/0x10 [] ? __slab_alloc+0x472/0x4c4 [] ? __crypto_alloc_tfm+0x52/0x170 [] ? __crypto_alloc_tfm+0x76/0x170 [] ? crypto_spawn_tfm+0x4c/0x90 [] ? __kmalloc+0x27f/0x290 [] ? cryptd_aead_init_tfm+0x2b/0x50 [] ? __crypto_alloc_tfm+0xf9/0x170 [] ? crypto_alloc_aead+0x6b/0xc0 [] ? cryptd_alloc_aead+0x76/0xb0 [] ? rfc4106_init+0x47/0x80 [] ? __crypto_alloc_tfm+0xf9/0x170 [] ? crypto_spawn_tfm+0x4c/0x90 [] alg_test_aead+0x52/0xc0 [] alg_test+0x100/0x320 [] ? __schedule+0x462/0x9d0 [] ? cryptomgr_probe+0xf0/0xf0 [] cryptomgr_test+0x45/0x50 [] kthread+0xb7/0xc0 [] ? sub_preempt_count+0x79/0xd0 [] kernel_thread_helper+0x4/0x10 [] ? finish_task_switch+0x7c/0x120 [] ? _raw_spin_unlock_irq+0x3b/0x60 [] ? retint_restore_args+0xe/0xe [] ? flush_kthread_worker+0x190/0x190 [] ? gs_change+0xb/0xb FIX kmalloc-32: Object at 0xffff8801054f5ac0 not freed