lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <19f34abd0902211419p4109f8bfsf987b68162b01f50@mail.gmail.com>
Date:	Sat, 21 Feb 2009 23:19:50 +0100
From:	Vegard Nossum <vegard.nossum@...il.com>
To:	Sitsofe Wheeler <sitsofe@...oo.com>
Cc:	linux-kernel@...r.kernel.org, Ingo Molnar <mingo@...e.hu>,
	Pekka Enberg <penberg@...helsinki.fi>
Subject: Re: Is kmemcheck currently broken on tip?

2009/2/21 Vegard Nossum <vegard.nossum@...il.com>:
> 2009/2/21 Sitsofe Wheeler <sitsofe@...oo.com>:
>> Hi,
>>
>> I've been trying to test kmemcheck in linux-tip on my EeePC and things
>> have been going suspiciously not so slow with little extra memory used
>> (at least compared to the last time I used kmemcheck). While I see
>> [    0.063412] kmemcheck: "Bugs, beware!"
>> in dmesg, I'm not sure kmemcheck is working especially since nothing is
>> flagged when I trigger the issue described in
>> http://marc.info/?l=linux-kernel&m=123472656015761&w=1 ...
>
> Thanks for the tip! :-D I get this:
>
...

> (Hm, maybe storing the unreliable stack frames wasn't such a good idea
> at all -- all they do is fill up the space.)
>

A different one, with more stack:

[  352.792672] WARNING: kmemcheck: Caught 8-bit read from uninitialized memory (
f54fb0b8)
[  352.801437] 2e76b5343061aa6a6fc5db64689d95188383de4b60554e79ffffffffffffffff
[  352.828424]  i i i i i i i i i i i i i i i i i i i i i i i i u u u u u u u u
[  352.855402]                                                  ^
[  352.861954]
[  352.864110] Pid: 2414, comm: cat Not tainted (2.6.29-rc4 #251) 945P-A
[  352.871286] EIP: 0060:[<c11a76e9>] EFLAGS: 00010297 CPU: 0
[  352.877479] EIP is at strnlen+0x9/0x20
[  352.881904] EAX: f54fb0b8 EBX: c162081e ECX: f54fb000 EDX: ffffff46
[  352.888900] ESI: ffffffff EDI: f54fb000 EBP: f552bd8c ESP: c17866e4
[  352.895897]  DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
[  352.902012] CR0: 8005003b CR2: f6c04070 CR3: 354fa000 CR4: 000006d0
[  352.909009] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[  352.916006] DR6: ffff4ff0 DR7: 00000400
[  353.023259]    [<c11a64a8>] string+0x28/0xd0
[  353.029382]    [<c11a69d4>] vsnprintf+0x484/0xac0
[  353.164334]    [<c11a702c>] sprintf+0x1c/0x20
[  353.170556]    [<c10443ff>] param_get_charp+0x1f/0x30
[  353.177475]    [<c1044152>] param_attr_show+0x22/0x50
[  353.191231]    [<c1043d88>] module_attr_show+0x28/0x40
[  353.198241]    [<c10efbad>] sysfs_read_file+0x7d/0x110
[  353.205246]    [<c10a52d9>] vfs_read+0x99/0x160
[  353.218557]    [<c10a545d>] sys_read+0x3d/0x70
[  353.224846]    [<c1003483>] sysenter_do_call+0x12/0x21
[  353.231857]    [<ffffffff>] 0xffffffff

That's where it happened:

$ addr2line -e vmlinux -i c11a76e9 c11a64a8 c11a69d4 c11a702c c10443ff
c1044152 c1043d88 c10efbad c10a52d9 c10a545d
arch/x86/lib/string_32.c:222
lib/vsprintf.c:524
lib/vsprintf.c:846
lib/vsprintf.c:1058
kernel/params.c:227
kernel/params.c:407
kernel/params.c:671
fs/sysfs/file.c:92
fs/sysfs/file.c:142
fs/read_write.c:292
fs/read_write.c:369
fs/read_write.c:382

(Code is -rc4)

Hope this helps, if you didn't sort it out already :-)


Vegard

-- 
"The animistic metaphor of the bug that maliciously sneaked in while
the programmer was not looking is intellectually dishonest as it
disguises that the error is the programmer's own creation."
	-- E. W. Dijkstra, EWD1036
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ