rdma_rxe use-after-free

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello,

If I run the srp tests from the blktests test suite long enough against
kernel v4.20-rc1 then the complaint shown below appears. Has anyone else
already encountered this? This is how I run the srp tests:

(cd blktests +ACYAJg while ./check -q srp+ADs do :+ADs done)

Thanks,

Bart.

+AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9
BUG: KASAN: use-after-free in rxe+AF8-resp+AF8-queue+AF8-pkt+-0x2b/0x70 +AFs-rdma+AF8-rxe+AF0
Read of size 1 at addr ffff8800361722d5 by task kworker/1:2/26251

CPU: 1 PID: 26251 Comm: kworker/1:2 Not tainted 4.20.0-rc1-dbg+- +ACM-2
Hardware name: QEMU Standard PC (i440FX +- PIIX, 1996), BIOS 1.10.2-1 04/01/2014
Workqueue: target+AF8-completion target+AF8-complete+AF8-ok+AF8-work +AFs-target+AF8-core+AF8-mod+AF0
Call Trace:
 +ADw-IRQ+AD4
 dump+AF8-stack+-0x86/0xca
 print+AF8-address+AF8-description+-0x71/0x239
 kasan+AF8-report.cold.5+-0x242/0x301
 +AF8AXw-asan+AF8-load1+-0x47/0x50
 rxe+AF8-resp+AF8-queue+AF8-pkt+-0x2b/0x70 +AFs-rdma+AF8-rxe+AF0
 rxe+AF8-rcv+-0x53e/0xb00 +AFs-rdma+AF8-rxe+AF0
 rxe+AF8-loopback+-0xe/0x10 +AFs-rdma+AF8-rxe+AF0
 rxe+AF8-requester+-0x13de/0x2130 +AFs-rdma+AF8-rxe+AF0
 rxe+AF8-do+AF8-task+-0xdd/0x170 +AFs-rdma+AF8-rxe+AF0
 tasklet+AF8-action+AF8-common.isra.14+-0xc0/0x280
 tasklet+AF8-action+-0x3d/0x50
 +AF8AXw-do+AF8-softirq+-0x128/0x5ae
 irq+AF8-exit+-0xdd/0x100
 smp+AF8-call+AF8-function+AF8-single+AF8-interrupt+-0x90/0x2b0
 call+AF8-function+AF8-single+AF8-interrupt+-0xf/0x20
 +ADw-/IRQ+AD4
RIP: 0010:+AF8-raw+AF8-spin+AF8-unlock+AF8-irq+-0x32/0x50
Code: 00 00 00 48 89 e5 53 48 89 fb 48 83 c7 18 48 8b 55 08 e8 a1 ff 30 ff 48 89 df e8 79 67 31 ff e8 34 b6 40 ff fb bf 01 00 00 00 +ADw-e8+AD4 09 e9 2b ff 65 8b 05 02 31 1d 7e 85 c0 74 03 5b 5d c3 e8 d9 7a
RSP: 0018:ffff8800b71e7d98 EFLAGS: 00000246 ORIG+AF8-RAX: ffffffffffffff04
RAX: 0000000000000000 RBX: ffff88011b66ac80 RCX: ffffffff8115b2e6
RDX: 0000000000000007 RSI: dffffc0000000000 RDI: 0000000000000001
RBP: ffff8800b71e7da0 R08: ffffed00236cd591 R09: ffffed00236cd590
R10: ffffed00236cd590 R11: ffff88011b66ac83 R12: ffff880112b49a00
R13: ffff88011b66acd0 R14: ffff88011b66ac80 R15: ffff88011b66acd0
 process+AF8-one+AF8-work+-0x3e6/0x9f0
 worker+AF8-thread+-0x67/0x5b0
 kthread+-0x1cf/0x1f0
 ret+AF8-from+AF8-fork+-0x24/0x30

Allocated by task 26251:
 save+AF8-stack+-0x43/0xd0
 kasan+AF8-kmalloc+-0xc7/0xe0
 kasan+AF8-slab+AF8-alloc+-0x11/0x20
 kmem+AF8-cache+AF8-alloc+AF8-node+-0xf3/0x350
 +AF8AXw-alloc+AF8-skb+-0xa8/0x310
 rxe+AF8-init+AF8-packet+-0xc8/0x220 +AFs-rdma+AF8-rxe+AF0
 rxe+AF8-requester+-0x5f9/0x2130 +AFs-rdma+AF8-rxe+AF0
 rxe+AF8-do+AF8-task+-0xdd/0x170 +AFs-rdma+AF8-rxe+AF0
 tasklet+AF8-action+AF8-common.isra.14+-0xc0/0x280
 tasklet+AF8-action+-0x3d/0x50
 +AF8AXw-do+AF8-softirq+-0x128/0x5ae

Freed by task 36:
 save+AF8-stack+-0x43/0xd0
 +AF8AXw-kasan+AF8-slab+AF8-free+-0x139/0x190
 kasan+AF8-slab+AF8-free+-0xe/0x10
 kmem+AF8-cache+AF8-free+-0xbc/0x330
 kfree+AF8-skbmem+-0x66/0xa0
 kfree+AF8-skb+-0x80/0x1b0
 rxe+AF8-responder+-0x663/0x3760 +AFs-rdma+AF8-rxe+AF0
 rxe+AF8-do+AF8-task+-0xdd/0x170 +AFs-rdma+AF8-rxe+AF0
 tasklet+AF8-action+AF8-common.isra.14+-0xc0/0x280
 tasklet+AF8-action+-0x3d/0x50
 +AF8AXw-do+AF8-softirq+-0x128/0x5ae

The buggy address belongs to the object at ffff880036172280
 which belongs to the cache skbuff+AF8-head+AF8-cache of size 200
The buggy address is located 85 bytes inside of
 200-byte region +AFs-ffff880036172280, ffff880036172348)
The buggy address belongs to the page:
page:ffffea0000d85c80 count:1 mapcount:0 mapping:ffff88011abb7200 index:0x0 compound+AF8-mapcount: 0
flags: 0x1fff000000010200(slab+AHw-head)
raw: 1fff000000010200 ffffea0002550a00 0000000600000006 ffff88011abb7200
raw: 0000000000000000 0000000080190019 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff880036172180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff880036172200: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
+AD4-ffff880036172280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                                                 +AF4
 ffff880036172300: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
 ffff880036172380: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb
+AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9AD0APQA9-



[Index of Archives]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Photo]     [Yosemite News]     [Yosemite Photos]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux