lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID:  <48D94459.7010501@yahoo.com>
Date:	Tue, 23 Sep 2008 20:32:41 +0100
From:	Sitsofe Wheeler <sitsofe@...oo.com>
To:	linux-kernel@...r.kernel.org
Cc:	vegard.nossum@...il.com
Subject:  [kmemcheck] read from uninitialized memory by netlink_broadcast?

While testing today's linux-tip I received a kmemcheck warning. Is this 
a spurious or already known report?

[   14.183601] kmemcheck: Caught 32-bit read from uninitialized memory 
(f7021f14)
[   14.183601] 
0100000000000000000000000000000000000000000000000000000000000000
[   14.185062]  i i i i i i i i i i i i i i i i i i i i u u u u u u u u 
u u u u
[   14.186453]                                          ^
[   14.186528]
[   14.186595] Pid: 3, comm: ksoftirqd/0 Not tainted 
(2.6.27-rc7-tipskw-00756-g6522eab #6) 900
[   14.186701] EIP: 0060:[<c034ca1f>] EFLAGS: 00000282 CPU: 0
[   14.186787] EIP is at pskb_expand_head+0x9f/0x160
[   14.186861] EAX: 00000080 EBX: f72c96c0 ECX: 00000036 EDX: f727f200
[   14.186927] ESI: f7021f14 EDI: f727f294 EBP: f7099eb4 ESP: c0543a88
[   14.187006]  DS: 007b ES: 007b FS: 0000 GS: 0000 SS: 0068
[   14.187083] CR0: 8005003b CR2: f7305700 CR3: 00534000 CR4: 000006d0
[   14.187162] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[   14.187241] DR6: ffff4ff0 DR7: 00000400
[   14.187312]  [<c0362ea8>] netlink_broadcast+0x68/0x370
[   14.187432]  [<c0365a4f>] genl_ctrl_event+0x30f/0x330
[   14.187548]  [<c0365fb6>] genl_register_mc_group+0xe6/0x140
[   14.187666]  [<c0515fdf>] genl_init+0x9f/0xe0
[   14.187781]  [<c010102f>] _stext+0x2f/0x160
[   14.187893]  [<c04f48e3>] kernel_init+0xc3/0x1a0
[   14.187997]  [<c010403b>] kernel_thread_helper+0x7/0x10
[   14.188114]  [<ffffffff>] 0xffffffff


-- 
Sitsofe | http://sucs.org/~sits/

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ