[PATCH 3/7] s3c-hsudc: add a remove function
Greg KH
greg at kroah.com
Tue Dec 20 01:08:05 EST 2011
On Sun, Dec 18, 2011 at 09:37:04PM +0000, Russell King - ARM Linux wrote:
> On Sun, Dec 18, 2011 at 09:46:08PM +0100, Heiko Stübner wrote:
> > > > kobject: 'holders' (c7addc80): kobject_cleanup
> > > > Unable to handle kernel paging request at virtual address bf055504
> > > > pgd = c0004000
> > > > [bf055504] *pgd=371f9811, *pte=00000000, *ppte=00000000
> > > > Internal error: Oops: 7 [#1]
> > >
> > > Please post the entire first oops dump for the above run - it may contain
> > > useful information to properly track this down.
> >
> > kobject: 'holders' (c7addc80): kobject_cleanup
> > Unable to handle kernel paging request at virtual address bf055504
> > pgd = c0004000
> > [bf055504] *pgd=371f9811, *pte=00000000, *ppte=00000000
> > Internal error: Oops: 7 [#1]
> > Modules linked in: ohci_hcd usbcore leds_s3c24xx i2c_s3c2410 i2c_core
> > CPU: 0 Not tainted (3.2.0-rc5-next-20111216+ #33)
> > PC is at kobject_put+0x18/0x7c
> > LR is at kobject_del+0x64/0x70
> > pc : [<c0114624>] lr : [<c011470c>] psr: a0000013
> > sp : c70bdef8 ip : c70bdf18 fp : c70bdf14
> > r10: 00000000 r9 : c0114718 r8 : c7803a00
> > r7 : c7abd360 r6 : c02e1de0 r5 : c7addca0 r4 : bf0554a0
> > r3 : 00000001 r2 : 00000000 r1 : 00000000 r0 : bf0554a0
> > Backtrace:
> > [<c011460c>] (kobject_put+0x0/0x7c) from [<c011470c>] (kobject_del+0x64/0x70)
> > r4:c7addc80
> > [<c01146a8>] (kobject_del+0x0/0x70) from [<c01147ec>] (kobject_delayed_cleanup+0xd4/0x174)
> > r4:c7addc80
> > [<c0114718>] (kobject_delayed_cleanup+0x0/0x174) from [<c00318fc>] (process_one_work+0x24c/0x3a8)
>
> Right, here's what I think is happening.
>
> You're right that 0xc7addc80 is being cleaned up. So, we enter
> kobject_cleanup() with kobj = 0xc7addc80. We get to this:
>
> /* remove from sysfs if the caller did not do it */
> if (kobj->state_in_sysfs) {
> pr_debug("kobject: '%s' (%p): auto cleanup kobject_del\n",
> kobject_name(kobj), kobj);
> kobject_del(kobj);
> }
>
> So, we call kobject_del() on c7addc80 (which we can see in r4 in the
> backtrace):
>
> void kobject_del(struct kobject *kobj)
> {
> if (!kobj)
> return;
>
> sysfs_remove_dir(kobj);
> kobj->state_in_sysfs = 0;
> kobj_kset_leave(kobj);
> kobject_put(kobj->parent);
>
> And so we get to kobject_put(), and we call that with a pointer of
> 0xbf0554a0. This is a pointer into struct module. And this is where
> the problem lies...
>
> The struct module is free'd as part of the core of the module
> (mod->module_core) here:
>
> static void module_deallocate(struct module *mod, struct load_info *info)
> {
> kfree(info->strmap);
> percpu_modfree(mod);
> module_free(mod, mod->module_init);
> module_free(mod, mod->module_core);
> }
>
> A struct module contains:
>
> struct module
> {
> ...
> /* Sysfs stuff. */
> struct module_kobject mkobj;
>
> which in turn is defined as:
>
> struct module_kobject {
> struct kobject kobj;
> ...
> }
>
> So, we have a struct kobject contained within a data structure which is
> independently allocated and freed - and this is highly illegal. I'm
> sure GregKH will want to discuss this with Rusty...
Ugh, that sucks, yes I'll work on this when I get back from vacation the
first week in January.
greg k-h
More information about the linux-arm-kernel
mailing list