On 07/26/2016 10:53 AM, Kirill A. Shutemov wrote:
On Tue, Jul 26, 2016 at 08:34:03AM +0200, Vegard Nossum wrote:
Using trinity + fault injection I've been running into this bug a lot:
==================================================================
BUG: KASAN: out-of-bounds in mprotect_fixup+0x523/0x5a0 at addr ffff8800b9e7d740
Read of size 8 by task trinity-c3/6338
[...]
I can give the reproducer a spin.
Could you post your reproducer? I guess it requires kernel instrumentation
to make allocation failure more likely.
I'm sorry but company policy prevents me from posting straight-up
reproducers. But as I said I'm happy to rerun it if you have an
alternative patch.
It should be enough to enable fault injection (echo 1 >
/proc/self/make-it-fail) for the process doing the mprotect().
Vegard
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@xxxxxxxxx. For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@xxxxxxxxx"> email@xxxxxxxxx </a>