Uploaded image for project: 'Lustre'
  1. Lustre
  2. LU-12968

KASAN: slab-out-of-bounds in mgs_wlp_lcfg+0xb3/0x4a0 [mgs]

    XMLWordPrintable

Details

    • Bug
    • Resolution: Fixed
    • Minor
    • Lustre 2.14.0
    • None
    • None
    • 3
    • 9223372036854775807

    Description

      ==================================================================
      Nov 5 19:39:50 mds kernel: BUG: KASAN: slab-out-of-bounds in mgs_wlp_lcfg+0xb3/0x4a0 [mgs]
      Nov 5 19:39:50 mds kernel: Read of size 64 at addr ffff8880b8f9fe40 by task ll_mgs_0002/17603
      Nov 5 19:39:50 mds kernel:
      Nov 5 19:39:50 mds kernel: CPU: 2 PID: 17603 Comm: ll_mgs_0002 Tainted: P O 5.4.0-1.ldiskfs.d.el7.x86_64 #1
      Nov 5 19:39:50 mds kernel: Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
      Nov 5 19:39:50 mds kernel: Call Trace:
      Nov 5 19:39:50 mds kernel: dump_stack+0x7b/0xba
      Nov 5 19:39:50 mds kernel: ? mgs_wlp_lcfg+0xb3/0x4a0 [mgs]
      Nov 5 19:39:50 mds kernel: print_address_description.constprop.7.cold.9+0x9/0x350
      Nov 5 19:39:50 mds kernel: ? mgs_wlp_lcfg+0xb3/0x4a0 [mgs]
      Nov 5 19:39:50 mds kernel: ? mgs_wlp_lcfg+0xb3/0x4a0 [mgs]
      Nov 5 19:39:50 mds kernel: __kasan_report.cold.10+0x1b/0x3f
      Nov 5 19:39:50 mds kernel: ? mgs_wlp_lcfg+0xb3/0x4a0 [mgs]
      Nov 5 19:39:50 mds kernel: kasan_report+0x12/0x20
      Nov 5 19:39:50 mds kernel: check_memory_region+0x153/0x1d0
      Nov 5 19:39:50 mds kernel: __asan_loadN+0xf/0x20
      Nov 5 19:39:50 mds kernel: mgs_wlp_lcfg+0xb3/0x4a0 [mgs]
      Nov 5 19:39:50 mds kernel: ? mgs_srpc_set_param+0xca0/0xca0 [mgs]
      Nov 5 19:39:50 mds kernel: ? mgs_wlp_lcfg+0x5/0x4a0 [mgs]
      Nov 5 19:39:50 mds kernel: ? server_name2index+0x5/0x100 [obdclass]
      Nov 5 19:39:50 mds kernel: mgs_write_log_param+0x2256/0x2f70 [mgs]
      Nov 5 19:39:50 mds kernel: ? 0xffffffffa0098077
      Nov 5 19:39:50 mds kernel: ? vsnprintf+0x655/0x8e0
      Nov 5 19:39:50 mds kernel: ? mgs_write_log_direct_all+0x8c0/0x8c0 [mgs]
      Nov 5 19:39:50 mds kernel: ? strcpy+0x30/0x50
      Nov 5 19:39:50 mds kernel: ? cfs_trace_unlock_tcd+0x20/0xb0 [libcfs]
      Nov 5 19:39:50 mds kernel: ? libcfs_debug_msg+0xd99/0xf30 [libcfs]
      Nov 5 19:39:50 mds kernel: ? __read_once_size_nocheck.constprop.5+0x10/0x10
      Nov 5 19:39:50 mds kernel: ? put_pages_on_daemon_list+0xd0/0xd0 [libcfs]
      Nov 5 19:39:50 mds kernel: ? lprocfs_counter_add+0x181/0x240 [obdclass]
      Nov 5 19:39:50 mds kernel: ? ftrace_call+0x5/0x34
      Nov 5 19:39:50 mds kernel: ? lprocfs_stats_unlock+0x20/0x70 [obdclass]
      Nov 5 19:39:50 mds kernel: ? mgs_write_log_param+0x5/0x2f70 [mgs]
      Nov 5 19:39:50 mds kernel: mgs_write_log_target+0x3e7/0x910 [mgs]
      Nov 5 19:39:50 mds kernel: ? mgs_set_index+0x990/0x990 [mgs]
      Nov 5 19:39:50 mds kernel: ? mgs_write_log_target+0x5/0x910 [mgs]
      Nov 5 19:39:50 mds kernel: mgs_target_reg+0xf13/0x1cd0 [mgs]
      Nov 5 19:39:50 mds kernel: ? mgs_revoke_lock+0x4f0/0x4f0 [mgs]
      Nov 5 19:39:50 mds kernel: ? lustre_pack_reply_v2+0x2fb/0x3e0 [ptlrpc]
      Nov 5 19:39:50 mds kernel: ? ftrace_call+0x5/0x34
      Nov 5 19:39:50 mds kernel: ? lustre_pack_reply_v2+0x3e0/0x3e0 [ptlrpc]
      Nov 5 19:39:50 mds kernel: ? mgs_revoke_lock+0x4f0/0x4f0 [mgs]
      Nov 5 19:39:50 mds kernel: ? tgt_request_handle+0xfc5/0x2290 [ptlrpc]
      Nov 5 19:39:50 mds kernel: ? mgs_target_reg+0x5/0x1cd0 [mgs]
      Nov 5 19:39:50 mds kernel: ? lustre_pack_reply+0x11/0x20 [ptlrpc]
      Nov 5 19:39:50 mds kernel: tgt_request_handle+0xfd1/0x2290 [ptlrpc]
      Nov 5 19:39:50 mds kernel: ? tgt_hpreq_handler+0x440/0x440 [ptlrpc]
      Nov 5 19:39:50 mds kernel: ? 0xffffffffa0098077
      Nov 5 19:39:50 mds kernel: ? lustre_msg_get_opc+0x18/0x100 [ptlrpc]
      Nov 5 19:39:50 mds kernel: ? tgt_hpreq_handler+0x440/0x440 [ptlrpc]
      Nov 5 19:39:50 mds kernel: ? ptlrpc_server_handle_request+0x576/0x1100 [ptlrpc]
      Nov 5 19:39:50 mds kernel: ? lustre_msg_buf_v2+0x53/0x220 [ptlrpc]
      Nov 5 19:39:50 mds kernel: ? tgt_request_handle+0x5/0x2290 [ptlrpc]
      Nov 5 19:39:50 mds kernel: ptlrpc_server_handle_request+0x582/0x1100 [ptlrpc]
      Nov 5 19:39:50 mds kernel: ptlrpc_main+0x133f/0x20b0 [ptlrpc]
      Nov 5 19:39:50 mds kernel: ? __switch_to_asm+0x34/0x70
      Nov 5 19:39:50 mds kernel: ? __switch_to_asm+0x40/0x70
      Nov 5 19:39:50 mds kernel: ? __switch_to_asm+0x34/0x70
      Nov 5 19:39:50 mds kernel: ? __switch_to_asm+0x40/0x70
      Nov 5 19:39:50 mds kernel: ? __switch_to_asm+0x40/0x70
      Nov 5 19:39:50 mds kernel: ? __switch_to_asm+0x34/0x70
      Nov 5 19:39:50 mds kernel: ? __switch_to_asm+0x40/0x70
      Nov 5 19:39:50 mds kernel: ? ptlrpc_register_service+0x1730/0x1730 [ptlrpc]
      Nov 5 19:39:50 mds kernel: ? ptlrpc_register_service+0x1730/0x1730 [ptlrpc]
      Nov 5 19:39:50 mds kernel: ? __kthread_parkme+0x90/0xb0
      Nov 5 19:39:50 mds kernel: ? ptlrpc_main+0x5/0x20b0 [ptlrpc]
      Nov 5 19:39:50 mds kernel: ? __kasan_check_read+0x11/0x20
      Nov 5 19:39:50 mds kernel: ? __kthread_parkme+0x90/0xb0
      Nov 5 19:39:50 mds kernel: kthread+0x1c8/0x1f0
      Nov 5 19:39:50 mds kernel: ? ptlrpc_register_service+0x1730/0x1730 [ptlrpc]
      Nov 5 19:39:50 mds kernel: ? kthread_parkme+0x50/0x50
      Nov 5 19:39:50 mds kernel: ret_from_fork+0x35/0x40
      Nov 5 19:39:50 mds kernel:
      Nov 5 19:39:50 mds kernel: Allocated by task 17603:
      Nov 5 19:39:50 mds kernel: save_stack+0x21/0x90
      Nov 5 19:39:50 mds kernel: __kasan_kmalloc.constprop.14+0xc1/0xd0
      Nov 5 19:39:50 mds kernel: kasan_kmalloc+0x9/0x10
      Nov 5 19:39:50 mds kernel: __kmalloc+0x139/0x300
      Nov 5 19:39:50 mds kernel: mgs_write_log_target+0x2ae/0x910 [mgs]
      Nov 5 19:39:50 mds kernel: mgs_target_reg+0xf13/0x1cd0 [mgs]
      Nov 5 19:39:50 mds kernel: tgt_request_handle+0xfd1/0x2290 [ptlrpc]
      Nov 5 19:39:50 mds kernel: ptlrpc_server_handle_request+0x582/0x1100 [ptlrpc]
      Nov 5 19:39:50 mds kernel: ptlrpc_main+0x133f/0x20b0 [ptlrpc]
      Nov 5 19:39:50 mds kernel: kthread+0x1c8/0x1f0
      Nov 5 19:39:50 mds kernel: ret_from_fork+0x35/0x40
      Nov 5 19:39:50 mds kernel:
      Nov 5 19:39:50 mds kernel: Freed by task 354:
      Nov 5 19:39:50 mds kernel: save_stack+0x21/0x90
      Nov 5 19:39:50 mds kernel: __kasan_slab_free+0x128/0x170
      Nov 5 19:39:50 mds kernel: kasan_slab_free+0xe/0x10
      Nov 5 19:39:50 mds kernel: kfree+0xa4/0x290
      Nov 5 19:39:50 mds kernel: top_trans_stop+0x25c/0x1570 [ptlrpc]
      Nov 5 19:39:50 mds kernel: lod_trans_stop+0x14a/0x5f0 [lod]
      Nov 5 19:39:50 mds kernel: mdd_trans_stop+0x68/0x222 [mdd]
      Nov 5 19:39:50 mds kernel: mdd_attr_set+0x965/0xef0 [mdd]
      Nov 5 19:39:50 mds kernel: mdt_reint_setxattr+0xf53/0x1490 [mdt]
      Nov 5 19:39:50 mds kernel: mdt_reint_rec+0xdf/0x2c0 [mdt]
      Nov 5 19:39:50 mds kernel: mdt_reint_internal+0x611/0xae0 [mdt]
      Nov 5 19:39:50 mds kernel: mdt_reint+0x8e/0x160 [mdt]
      Nov 5 19:39:50 mds kernel: tgt_request_handle+0xfd1/0x2290 [ptlrpc]
      Nov 5 19:39:50 mds kernel: ptlrpc_server_handle_request+0x582/0x1100 [ptlrpc]
      Nov 5 19:39:50 mds kernel: ptlrpc_main+0x133f/0x20b0 [ptlrpc]
      Nov 5 19:39:50 mds kernel: kthread+0x1c8/0x1f0
      Nov 5 19:39:50 mds kernel: ret_from_fork+0x35/0x40
      Nov 5 19:39:50 mds kernel:
      Nov 5 19:39:50 mds kernel: The buggy address belongs to the object at ffff8880b8f9fe40#012 which belongs to the cache kmalloc-64 of size 64
      Nov 5 19:39:50 mds kernel: The buggy address is located 0 bytes inside of#012 64-byte region [ffff8880b8f9fe40, ffff8880b8f9fe80)
      Nov 5 19:39:50 mds kernel: The buggy address belongs to the page:
      Nov 5 19:39:50 mds kernel: page:ffffea0002e3e780 refcount:1 mapcount:0 mapping:ffff88810c00f440 index:0x0 compound_mapcount: 0
      Nov 5 19:39:50 mds kernel: flags: 0xfffffc0010200(slab|head)
      Nov 5 19:39:50 mds kernel: raw: 000fffffc0010200 ffffea000243f108 ffffea0002503a08 ffff88810c00f440
      Nov 5 19:39:50 mds kernel: raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000
      Nov 5 19:39:50 mds kernel: page dumped because: kasan: bad access detected
      Nov 5 19:39:50 mds kernel:
      Nov 5 19:39:50 mds kernel: Memory state around the buggy address:
      Nov 5 19:39:50 mds kernel: ffff8880b8f9fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
      Nov 5 19:39:50 mds kernel: ffff8880b8f9fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
      Nov 5 19:39:50 mds kernel: >ffff8880b8f9fe00: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 fc
      Nov 5 19:39:50 mds kernel: ^
      Nov 5 19:39:50 mds kernel: ffff8880b8f9fe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
      Nov 5 19:39:50 mds kernel: ffff8880b8f9ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
      Nov 5 19:39:50 mds kernel: ==================================================================

      Attachments

        Activity

          People

            stancheff Shaun Tancheff
            stancheff Shaun Tancheff
            Votes:
            0 Vote for this issue
            Watchers:
            3 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: