fs,eventfd: BUG kmalloc-128, Poison overwritten

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi all,

During fuzzing with trinity inside a KVM tools guest, using latest linux-next, I've stumbled on the following:

[ 1113.948407] =============================================================================
[ 1113.949014] BUG kmalloc-128 (Tainted: G        W   ): Poison overwritten
[ 1113.949014] -----------------------------------------------------------------------------
[ 1113.949014] 
[ 1113.949014] INFO: 0xffff8800496c8000-0xffff8800496c8000. First byte 0x6a instead of 0x6b
[ 1113.949014] INFO: Allocated in eventfd_file_create+0x4d/0xd0 age=54768 cpu=4 pid=15908
[ 1113.949014]  __slab_alloc+0x638/0x6f0
[ 1113.949014]  kmem_cache_alloc_trace+0xbb/0x230
[ 1113.949014]  eventfd_file_create+0x4d/0xd0
[ 1113.949014]  sys_eventfd2+0x3a/0x80
[ 1113.949014]  system_call_fastpath+0x16/0x1b
[ 1113.949014] INFO: Freed in eventfd_ctx_put+0x14/0x20 age=51749 cpu=4 pid=15908
[ 1113.949014]  __slab_free+0x33/0x560
[ 1113.949014]  kfree+0x2bb/0x2d0
[ 1113.949014]  eventfd_ctx_put+0x14/0x20
[ 1113.949014]  eventfd_release+0x30/0x40
[ 1113.949014]  __fput+0x11a/0x2c0
[ 1113.949014]  fput+0x15/0x20
[ 1113.949014]  filp_close+0x82/0xa0
[ 1113.949014]  close_files+0x1b4/0x200
[ 1113.949014]  put_files_struct+0x21/0x180
[ 1113.949014]  exit_files+0x4d/0x60
[ 1113.949014]  do_exit+0x322/0x510
[ 1113.949014]  do_group_exit+0xa1/0xe0
[ 1113.949014]  sys_exit_group+0x12/0x20
[ 1113.949014]  system_call_fastpath+0x16/0x1b
[ 1113.949014] INFO: Slab 0xffffea000125b200 objects=17 used=17 fp=0x          (null) flags=0x150000000004080
[ 1113.949014] INFO: Object 0xffff8800496c8000 @offset=0 fp=0xffff8800496c81c8
[ 1113.949014] 
[ 1113.949014] Object ffff8800496c8000: 6a 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  jkkkkkkkkkkkkkkk
[ 1113.949014] Object ffff8800496c8010: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
[ 1113.949014] Object ffff8800496c8020: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
[ 1113.949014] Object ffff8800496c8030: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
[ 1113.949014] Object ffff8800496c8040: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
[ 1113.949014] Object ffff8800496c8050: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
[ 1113.949014] Object ffff8800496c8060: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
[ 1113.949014] Object ffff8800496c8070: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b a5  kkkkkkkkkkkkkkk.
[ 1113.949014] Redzone ffff8800496c8080: bb bb bb bb bb bb bb bb                          ........
[ 1113.949014] Padding ffff8800496c81c0: 5a 5a 5a 5a 5a 5a 5a 5a                          ZZZZZZZZ
[ 1113.949014] Pid: 16574, comm: trinity Tainted: G        W    3.4.0-next-20120524-sasha-00003-ge89ff01 #281
[ 1113.949014] Call Trace:
[ 1113.949014]  [<ffffffff81217b12>] print_trailer+0x132/0x140
[ 1113.949014]  [<ffffffff81217f51>] check_bytes_and_report+0xe1/0x130
[ 1113.949014]  [<ffffffff8121a17c>] check_object+0xcc/0x220
[ 1113.949014]  [<ffffffff812adaaf>] ? sysfs_get_open_dirent+0x9f/0x150
[ 1113.949014]  [<ffffffff8121a726>] alloc_debug_processing+0xb6/0x160
[ 1113.949014]  [<ffffffff8121cd08>] __slab_alloc+0x638/0x6f0
[ 1113.949014]  [<ffffffff8114932d>] ? trace_hardirqs_on+0xd/0x10
[ 1113.949014]  [<ffffffff812adaaf>] ? sysfs_get_open_dirent+0x9f/0x150
[ 1113.949014]  [<ffffffff81146c6d>] ? __lock_acquired+0x3d/0x2e0
[ 1113.949014]  [<ffffffff812ada36>] ? sysfs_get_open_dirent+0x26/0x150
[ 1113.949014]  [<ffffffff8121de4b>] kmem_cache_alloc_trace+0xbb/0x230
[ 1113.949014]  [<ffffffff812adaaf>] ? sysfs_get_open_dirent+0x9f/0x150
[ 1113.949014]  [<ffffffff812adaaf>] sysfs_get_open_dirent+0x9f/0x150
[ 1113.949014]  [<ffffffff812adc9d>] sysfs_open_file+0x13d/0x190
[ 1113.949014]  [<ffffffff812adb60>] ? sysfs_get_open_dirent+0x150/0x150
[ 1113.949014]  [<ffffffff8122f5c9>] __dentry_open+0x229/0x370
[ 1113.949014]  [<ffffffff8122f775>] nameidata_to_filp+0x65/0x80
[ 1113.949014]  [<ffffffff8124019c>] do_last+0x67c/0x850
[ 1113.949014]  [<ffffffff81241187>] path_openat+0xd7/0x4a0
[ 1113.949014]  [<ffffffff81241664>] do_filp_open+0x44/0xa0
[ 1113.949014]  [<ffffffff82f71a50>] ? _raw_spin_unlock+0x30/0x60
[ 1113.949014]  [<ffffffff81250abd>] ? alloc_fd+0x1ed/0x200
[ 1113.949014]  [<ffffffff81230a05>] do_sys_open+0x125/0x1c0
[ 1113.949014]  [<ffffffff81230adc>] sys_open+0x1c/0x20
[ 1113.949014]  [<ffffffff82f72bf9>] system_call_fastpath+0x16/0x1b
[ 1113.949014] FIX kmalloc-128: Restoring 0xffff8800496c8000-0xffff8800496c8000=0x6b
[ 1113.949014] 
[ 1113.949014] FIX kmalloc-128: Marking all objects used

--
To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Ext4 Filesystem]     [Union Filesystem]     [Filesystem Testing]     [Ceph Users]     [Ecryptfs]     [AutoFS]     [Kernel Newbies]     [Share Photos]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux Cachefs]     [Reiser Filesystem]     [Linux RAID]     [Samba]     [Device Mapper]     [CEPH Development]
  Powered by Linux