Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 676099 - ip_gre module throws slab corruption errors upon removal from the kernel
ip_gre module throws slab corruption errors upon removal from the kernel
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: kernel (Show other bugs)
6.1
Unspecified Unspecified
high Severity high
: rc
: ---
Assigned To: Herbert Xu
Petr Beňas
Regression
:
Depends On:
Blocks: 6.1KnownIssues
  Show dependency treegraph
 
Reported: 2011-02-08 15:17 EST by Mike Gahagan
Modified: 2015-01-04 18:00 EST (History)
7 users (show)

See Also:
Fixed In Version: kernel-2.6.32-118.el6
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2011-05-23 16:39:20 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
net: Do not zero object we just freed (398 bytes, patch)
2011-02-11 18:18 EST, Herbert Xu
no flags Details | Diff


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2011:0542 normal SHIPPED_LIVE Important: Red Hat Enterprise Linux 6.1 kernel security, bug fix and enhancement update 2011-05-19 07:58:07 EDT

  None (edit)
Description Mike Gahagan 2011-02-08 15:17:09 EST
Description of problem:

GRE over IPv4 tunneling driver
Slab corruption (Not tainted): size-128 start=ffff88001b2dde88, len=128
Redzone: 0x9f911029d74e35b/0x9f911029d74e35b.
Last user: [<ffffffff8145a35a>](rx_queue_release+0x6a/0x80)
010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Prev obj: start=ffff88001b2dddf0, len=128
Redzone: 0xd84156c5635688c0/0xd84156c5635688c0.
Last user: [<ffffffff810bcd0e>](load_module+0x1aee/0x1dd0)
000: b8 65 36 1d 00 88 ff ff 01 00 00 00 00 00 00 00
010: 80 6f 66 1a 00 88 ff ff 00 00 00 00 00 00 00 00
Next obj: start=ffff88001b2ddf20, len=128
Redzone: 0xd84156c5635688c0/0xd84156c5635688c0.
Last user: [<ffffffff8115a8cb>](alloc_vmap_area+0x5b/0x390)
000: 00 00 3c a0 ff ff ff ff 00 50 3c a0 ff ff ff ff
010: 04 00 00 00 00 00 00 00 79 35 cc 19 00 88 ff ff



Version-Release number of selected component (if applicable):
2.6.32-115.el6.x86_64.debug

How reproducible:
always

Steps to Reproduce:
1.boot kernel-debug
2.modprobe ip_gre
3.rmmod ip_gre
  
Actual results:
slab corruption warnings. The can also appear spordically when other modules are loaded or unloaded.

Expected results:
module loads and unloads with no warnings or errors.

Additional info:
Comment 2 Mike Gahagan 2011-02-08 16:45:12 EST
Just in case it makes any difference, I reproduced this on an x86_64 kvm guest running on an x86_64 RHEL 6.0 host. The host has:

[mpg@dhcp231-174 x86_64]$ rpm -qa | grep kvm
qemu-kvm-tools-0.12.1.2-2.113.el6.x86_64
qemu-kvm-0.12.1.2-2.113.el6.x86_64
[mpg@dhcp231-174 x86_64]$ uname -r
2.6.32-71.6.1.el6.x86_64
Comment 3 Herbert Xu 2011-02-11 18:18:15 EST
Created attachment 478326 [details]
net: Do not zero object we just freed

Does this patch help?
Comment 5 Mike Gahagan 2011-02-15 11:13:55 EST
2.6.32-115.el6.bz676099 seems to help. I tried both the x86_64 and x86_64.debug kernel on my test VM and was not able to reproduce the problem.
Comment 6 RHEL Product and Program Management 2011-02-15 17:39:47 EST
This request was evaluated by Red Hat Product Management for inclusion
in a Red Hat Enterprise Linux maintenance release. Product Management has 
requested further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed 
products. This request is not yet committed for inclusion in an Update release.
Comment 7 Aristeu Rozanski 2011-02-23 13:36:16 EST
Patch(es) available on kernel-2.6.32-118.el6
Comment 11 Petr Beňas 2011-02-28 09:19:26 EST
Reproduced in 2.6.32-115.el6.x86_64.debug and 2.6.32-117.el6.x86_64.debug. 
Verified in 2.6.32-118.el6.x86_64.debug.
Comment 12 errata-xmlrpc 2011-05-23 16:39:20 EDT
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2011-0542.html

Note You need to log in before you can comment on or make changes to this bug.