On Sun, Dec 18, 2011 at 09:37:04PM +0000, Russell King - ARM Linux wrote: > On Sun, Dec 18, 2011 at 09:46:08PM +0100, Heiko Stübner wrote: > > > > kobject: 'holders' (c7addc80): kobject_cleanup > > > > Unable to handle kernel paging request at virtual address bf055504 > > > > pgd = c0004000 > > > > [bf055504] *pgd=371f9811, *pte=00000000, *ppte=00000000 > > > > Internal error: Oops: 7 [#1] > > > > > > Please post the entire first oops dump for the above run - it may contain > > > useful information to properly track this down. > > > > kobject: 'holders' (c7addc80): kobject_cleanup > > Unable to handle kernel paging request at virtual address bf055504 > > pgd = c0004000 > > [bf055504] *pgd=371f9811, *pte=00000000, *ppte=00000000 > > Internal error: Oops: 7 [#1] > > Modules linked in: ohci_hcd usbcore leds_s3c24xx i2c_s3c2410 i2c_core > > CPU: 0 Not tainted (3.2.0-rc5-next-20111216+ #33) > > PC is at kobject_put+0x18/0x7c > > LR is at kobject_del+0x64/0x70 > > pc : [<c0114624>] lr : [<c011470c>] psr: a0000013 > > sp : c70bdef8 ip : c70bdf18 fp : c70bdf14 > > r10: 00000000 r9 : c0114718 r8 : c7803a00 > > r7 : c7abd360 r6 : c02e1de0 r5 : c7addca0 r4 : bf0554a0 > > r3 : 00000001 r2 : 00000000 r1 : 00000000 r0 : bf0554a0 > > Backtrace: > > [<c011460c>] (kobject_put+0x0/0x7c) from [<c011470c>] (kobject_del+0x64/0x70) > > r4:c7addc80 > > [<c01146a8>] (kobject_del+0x0/0x70) from [<c01147ec>] (kobject_delayed_cleanup+0xd4/0x174) > > r4:c7addc80 > > [<c0114718>] (kobject_delayed_cleanup+0x0/0x174) from [<c00318fc>] (process_one_work+0x24c/0x3a8) > > Right, here's what I think is happening. > > You're right that 0xc7addc80 is being cleaned up. So, we enter > kobject_cleanup() with kobj = 0xc7addc80. We get to this: > > /* remove from sysfs if the caller did not do it */ > if (kobj->state_in_sysfs) { > pr_debug("kobject: '%s' (%p): auto cleanup kobject_del\n", > kobject_name(kobj), kobj); > kobject_del(kobj); > } > > So, we call kobject_del() on c7addc80 (which we can see in r4 in the > backtrace): > > void kobject_del(struct kobject *kobj) > { > if (!kobj) > return; > > sysfs_remove_dir(kobj); > kobj->state_in_sysfs = 0; > kobj_kset_leave(kobj); > kobject_put(kobj->parent); > > And so we get to kobject_put(), and we call that with a pointer of > 0xbf0554a0. This is a pointer into struct module. And this is where > the problem lies... > > The struct module is free'd as part of the core of the module > (mod->module_core) here: > > static void module_deallocate(struct module *mod, struct load_info *info) > { > kfree(info->strmap); > percpu_modfree(mod); > module_free(mod, mod->module_init); > module_free(mod, mod->module_core); > } > > A struct module contains: > > struct module > { > ... > /* Sysfs stuff. */ > struct module_kobject mkobj; > > which in turn is defined as: > > struct module_kobject { > struct kobject kobj; > ... > } > > So, we have a struct kobject contained within a data structure which is > independently allocated and freed - and this is highly illegal. I'm > sure GregKH will want to discuss this with Rusty... Ugh, that sucks, yes I'll work on this when I get back from vacation the first week in January. greg k-h -- To unsubscribe from this list: send the line "unsubscribe linux-usb" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html