debug with Linux slub allocator
Make sure slub allocator is built in your kernel.
CONFIG_SLUB_DEBUG=y
CONFIG_SLUB=y
The slub allocator creates additional meta data to store allocate/free traces and timestamps. Everytime slub allocator allocate/free an object, it do poison check (data area) and redzone check (boundry).
The module shows how it happens. It allocates 32 bytes from kernel and we overwrite the redzone by memset 36 bytes.
void try_to_corrupt_redzone(void)
{
void *p = kmalloc(32, GFP_KERNEL);
if (p) {
pr_alert("p: 0x%p\n", p);
memset(p, 0x12, 36); /* write too much */
print_hex_dump(KERN_ALERT, "mem: ", DUMP_PREFIX_ADDRESS,
16, 1, p, 512, 1);
kfree(p); /* slub.c should catch this error */
}
} static int mymodule_init(void)
{
pr_alert("%s init\n", __FUNCTION__);
try_to_corrupt_redzone();
return 0;
} static void mymodule_exit(void)
{
pr_alert("%s exit\n", __FUNCTION__);
} module_init(mymodule_init);
module_exit(mymodule_exit);
After freeing the object, the kernel checks the object and find that the redzone is overwritten and says:
[ 2050.630002] mymodule_init init
[ 2050.630565] p: 0xddc86680
[ 2050.630653] mem: ddc86680: 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 ................
[ 2050.630779] mem: ddc86690: 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 ................
[ 2050.630897] mem: ddc866a0: 12 12 12 12 60 6b c8 dd 16 80 99 e0 fa 8e 2a c1 ....`k........*.
[ 2050.631014] mem: ddc866b0: 16 80 99 e0 ce 92 2a c1 16 80 99 e0 f2 c1 1b c1 ......*.........
[ 2050.631130] mem: ddc866c0: 16 80 99 e0 4c 8b 0a c1 4c 8b 0a c1 61 80 99 e0 ....L...L...a...
[ 2050.631248] mem: ddc866d0: 16 80 99 e0 61 80 99 e0 16 80 99 e0 61 80 99 e0 ....a.......a...
[ 2050.631365] mem: ddc866e0: 75 80 99 e0 48 01 00 c1 2b 36 05 c1 00 00 00 00 u...H...+6......
[ 2050.631483] mem: ddc866f0: 4a 0c 00 00 99 ad 06 00 6d 35 05 c1 9e 8b 2a c1 J.......m5....*.
[ 2050.631599] mem: ddc86700: 6d 35 05 c1 48 8c 2a c1 6d 35 05 c1 ee 89 0a c1 m5..H.*.m5......
[ 2050.631716] mem: ddc86710: ee 89 0a c1 e4 0a 14 c1 e4 0a 14 c1 ee 89 0a c1 ................
[ 2050.631832] mem: ddc86720: ee 89 0a c1 6d 35 05 c1 6d 35 05 c1 6d 35 05 c1 ....m5..m5..m5..
[ 2050.631948] mem: ddc86730: a7 39 05 c1 ef b8 2a c1 00 00 00 00 00 00 00 00 .9....*.........
[ 2050.633948] mem: ddc86740: 4a 0c 00 00 97 ad 06 00 5a 5a 5a 5a 5a 5a 5a 5a J.......ZZZZZZZZ
[ 2050.634095] mem: ddc86750: 14 dc 46 dd 14 dc 46 dd 00 00 00 00 6b 6b 6b 6b ..F...F.....kkkk
[ 2050.634236] mem: ddc86760: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b a5 kkkkkkkkkkkkkkk.
[ 2050.634378] mem: ddc86770: cc cc cc cc c0 69 c8 dd a0 83 20 c1 fa 8e 2a c1 .....i.... ...*.
[ 2050.634629] =============================================================================
[ 2050.634750] BUG kmalloc-32 (Tainted: P B O): Redzone overwritten
[ 2050.634828] -----------------------------------------------------------------------------
[ 2050.634828]
[ 2050.634967] INFO: 0xddc866a0-0xddc866a3. First byte 0x12 instead of 0xcc
[ 2050.635123] INFO: Allocated in try_to_corrupt_redzone+0x16/0x61 [mymodule] age=1 cpu=0 pid=3146
[ 2050.635255] alloc_debug_processing+0x63/0xd1
[ 2050.635337] try_to_corrupt_redzone+0x16/0x61 [mymodule]
[ 2050.635423] __slab_alloc.constprop.73+0x366/0x384
[ 2050.635506] try_to_corrupt_redzone+0x16/0x61 [mymodule]
[ 2050.635594] vt_console_print+0x21e/0x226
[ 2050.635672] try_to_corrupt_redzone+0x16/0x61 [mymodule]
[ 2050.635758] kmem_cache_alloc_trace+0x43/0xd7
[ 2050.635832] kmem_cache_alloc_trace+0x43/0xd7
[ 2050.635909] mymodule_init+0x0/0x19 [mymodule]
[ 2050.635992] try_to_corrupt_redzone+0x16/0x61 [mymodule]
[ 2050.636003] mymodule_init+0x0/0x19 [mymodule]
[ 2050.636092] try_to_corrupt_redzone+0x16/0x61 [mymodule]
[ 2050.636179] mymodule_init+0x0/0x19 [mymodule]
[ 2050.636261] mymodule_init+0x14/0x19 [mymodule]
[ 2050.636343] do_one_initcall+0x6c/0xf4
[ 2050.636428] load_module+0x1690/0x199a
[ 2050.636508] INFO: Freed in load_module+0x15d2/0x199a age=3 cpu=0 pid=3146
[ 2050.636598] free_debug_processing+0xd6/0x142
[ 2050.636676] load_module+0x15d2/0x199a
[ 2050.636749] __slab_free+0x3e/0x28d
[ 2050.636819] load_module+0x15d2/0x199a
[ 2050.636888] kfree+0xe4/0x102
[ 2050.636953] kfree+0xe4/0x102
[ 2050.637020] kobject_uevent_env+0x361/0x39a
[ 2050.637091] kobject_uevent_env+0x361/0x39a
[ 2050.637163] kfree+0xe4/0x102
[ 2050.637227] kfree+0xe4/0x102
[ 2050.637294] load_module+0x15d2/0x199a
[ 2050.637366] load_module+0x15d2/0x199a
[ 2050.637438] load_module+0x15d2/0x199a
[ 2050.637509] SyS_init_module+0x72/0x8a
[ 2050.637581] syscall_call+0x7/0xb
[ 2050.637649] INFO: Slab 0xdffa90c0 objects=19 used=8 fp=0xddc86000 flags=0x40000080
[ 2050.637749] INFO: Object 0xddc86680 @offset=1664 fp=0xddc86b60
[ 2050.637749]
[ 2050.637875] Bytes b4 ddc86670: 14 01 00 00 95 ad 06 00 5a 5a 5a 5a 5a 5a 5a 5a ........ZZZZZZZZ
[ 2050.637875] Object ddc86680: 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 ................
[ 2050.637875] Object ddc86690: 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 ................
[ 2050.637875] Redzone ddc866a0: 12 12 12 12 ....
[ 2050.637875] Padding ddc86748: 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZ
[ 2050.637875] CPU: 0 PID: 3146 Comm: insmod Tainted: P B O 3.10.17 #1
[ 2050.637875] Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
[ 2050.637875] 00000000 c10a7b59 c10941c5 dffa90c0 ddc86680 de8012cc de801280 ddc86680
[ 2050.637875] dffa90c0 c10a7bd3 c13689a5 ddc866a0 000000cc 00000004 de801280 ddc86680
[ 2050.637875] dffa90c0 de800e00 c12a8b2f 000000cc ddc86680 de801280 dffa90c0 dd407e50
[ 2050.637875] Call Trace:
[ 2050.637875] [<c10a7b59>] ? check_bytes_and_report+0x6d/0xb0
[ 2050.637875] [<c10941c5>] ? page_address+0x1a/0x79
[ 2050.637875] [<c10a7bd3>] ? check_object+0x37/0x149
[ 2050.637875] [<c12a8b2f>] ? free_debug_processing+0x67/0x142
[ 2050.637875] [<c12a8c48>] ? __slab_free+0x3e/0x28d
[ 2050.637875] [<e0998075>] ? mymodule_init+0x14/0x19 [mymodule]
[ 2050.637875] [<c102063d>] ? wake_up_klogd+0x1d/0x1e
[ 2050.637875] [<c10a89ee>] ? kfree+0xe4/0x102
[ 2050.637875] [<c10a89ee>] ? kfree+0xe4/0x102
[ 2050.637875] [<e0998075>] ? mymodule_init+0x14/0x19 [mymodule]
[ 2050.637875] [<e0998075>] ? mymodule_init+0x14/0x19 [mymodule]
[ 2050.637875] [<e0998061>] ? try_to_corrupt_redzone+0x61/0x61 [mymodule]
[ 2050.637875] [<e0998075>] ? mymodule_init+0x14/0x19 [mymodule]
[ 2050.637875] [<c1000148>] ? do_one_initcall+0x6c/0xf4
[ 2050.637875] [<c105362b>] ? load_module+0x1690/0x199a
[ 2050.637875] [<c10539a7>] ? SyS_init_module+0x72/0x8a
[ 2050.637875] [<c12ab8ef>] ? syscall_call+0x7/0xb
[ 2050.637875] FIX kmalloc-32: Restoring 0xddc866a0-0xddc866a3=0xcc
[ 2050.637875]
[ 2051.232817] mymodule_exit exit
First the slub allocator print the error type "redzone overwritten"
[ 2050.634629] =============================================================================
[ 2050.634750] BUG kmalloc-32 (Tainted: P B O): Redzone overwritten
[ 2050.634828] -----------------------------------------------------------------------------
[ 2050.634828]
[ 2050.634967] INFO: 0xddc866a0-0xddc866a3. First byte 0x12 instead of 0xcc
To understand what readzone is, take a look at the memory content around the object:
[ 2050.637875] Bytes b4 ddc86670: 14 01 00 00 95 ad 06 00 5a 5a 5a 5a 5a 5a 5a 5a ........ZZZZZZZZ
[ 2050.637875] Object ddc86680: 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 ................
[ 2050.637875] Object ddc86690: 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 ................
[ 2050.637875] Redzone ddc866a0: 12 12 12 12 ....
[ 2050.637875] Padding ddc86748: 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZ
We fill 38 bytes of 0x12 from the start of the 36-bytes object (0xddc86680 - 0xddc8669f) and 4 more 0x12 on the redzone (normal 0xbb or 0xcc). When the object is returned to the kernel, kernel finds that the redzone is neither 0xcc or 0xbb and reports this as a BUG.
The slub allocator reports the latest allocate/free history of this object. You can see the object is just allocated by our kernel module function 'try_to_corrup_redzone'.
Sometime the traces of the object are more useful than function backtrace. For example, if there exists an use-after-free case: function A allocates an object and writes if after freeing the object. If the object is allocated by another function B. In this case, function B has a corrupted object, and if we have the free trace of this object, we can trace back to the previous owner of the object, function A.
[ 2050.635123] INFO: Allocated in try_to_corrupt_redzone+0x16/0x61 [mymodule] age=1 cpu=0 pid=3146
[ 2050.635255] alloc_debug_processing+0x63/0xd1
[ 2050.635337] try_to_corrupt_redzone+0x16/0x61 [mymodule]
[ 2050.635423] __slab_alloc.constprop.73+0x366/0x384
[ 2050.635506] try_to_corrupt_redzone+0x16/0x61 [mymodule]
[ 2050.635594] vt_console_print+0x21e/0x226
[ 2050.635672] try_to_corrupt_redzone+0x16/0x61 [mymodule]
[ 2050.635758] kmem_cache_alloc_trace+0x43/0xd7
[ 2050.635832] kmem_cache_alloc_trace+0x43/0xd7
[ 2050.635909] mymodule_init+0x0/0x19 [mymodule]
[ 2050.635992] try_to_corrupt_redzone+0x16/0x61 [mymodule]
[ 2050.636003] mymodule_init+0x0/0x19 [mymodule]
[ 2050.636092] try_to_corrupt_redzone+0x16/0x61 [mymodule]
[ 2050.636179] mymodule_init+0x0/0x19 [mymodule]
[ 2050.636261] mymodule_init+0x14/0x19 [mymodule]
[ 2050.636343] do_one_initcall+0x6c/0xf4
[ 2050.636428] load_module+0x1690/0x199a
[ 2050.636508] INFO: Freed in load_module+0x15d2/0x199a age=3 cpu=0 pid=3146
[ 2050.636598] free_debug_processing+0xd6/0x142
[ 2050.636676] load_module+0x15d2/0x199a
[ 2050.636749] __slab_free+0x3e/0x28d
[ 2050.636819] load_module+0x15d2/0x199a
[ 2050.636888] kfree+0xe4/0x102
[ 2050.636953] kfree+0xe4/0x102
[ 2050.637020] kobject_uevent_env+0x361/0x39a
[ 2050.637091] kobject_uevent_env+0x361/0x39a
[ 2050.637163] kfree+0xe4/0x102
[ 2050.637227] kfree+0xe4/0x102
[ 2050.637294] load_module+0x15d2/0x199a
[ 2050.637366] load_module+0x15d2/0x199a
[ 2050.637438] load_module+0x15d2/0x199a
[ 2050.637509] SyS_init_module+0x72/0x8a
debug with Linux slub allocator的更多相关文章
- (转)Linux SLUB 分配器详解
原文网址:https://www.ibm.com/developerworks/cn/linux/l-cn-slub/ 多年以来,Linux 内核使用一种称为 SLAB 的内核对象缓冲区分配器.但是, ...
- Linux Kernel - Debug Guide (Linux内核调试指南 )
http://blog.csdn.net/blizmax6/article/details/6747601 linux内核调试指南 一些前言 作者前言 知识从哪里来 为什么撰写本文档 为什么需要汇编级 ...
- 【debug】 Linux中top的使用
在我们日常的开发中,我们经常需要查看每个线程的cpu使用情况.其实,在linux中,top也是我们查看cpu使用状况的一个好帮手 top:先查看每一个进程的使用状况 我们可以发现PID:3800这个经 ...
- gdb pretty printer for STL debug in Linux
Check your gcc version. If it is less than 4.7, you need use another printer.py file. Get the file f ...
- [轉]Exploit Linux Kernel Slub Overflow
Exploit Linux Kernel Slub Overflow By wzt 一.前言 最近几年关于kernel exploit的研究比较热门,常见的内核提权漏洞大致可以分为几类: 空指针引用, ...
- 现在的 Linux 内核和 Linux 2.6 的内核有多大区别?
作者:larmbr宇链接:https://www.zhihu.com/question/35484429/answer/62964898来源:知乎著作权归作者所有.商业转载请联系作者获得授权,非商业转 ...
- linux进程用户内存空间和内核空间
When a process running in user mode requests additional memory, pages are allocated from the list of ...
- Linux内存描述之内存页面page--Linux内存管理(四)
1 Linux如何描述物理内存 Linux把物理内存划分为三个层次来管理 层次 描述 存储节点(Node) CPU被划分为多个节点(node), 内存则被分簇, 每个CPU对应一个本地物理内存, 即一 ...
- 转 Linux内存管理原理
Linux内存管理原理 在用户态,内核态逻辑地址专指下文说的线性偏移前的地址Linux内核虚拟3.伙伴算法和slab分配器 16个页面RAM因为最大连续内存大小为16个页面 页面最多16个页面,所以1 ...
随机推荐
- 转:npm install 时总是报phantomjs-prebuilt@2.1.14安装失败
该文章转自:http://www.cnblogs.com/alice626/p/6206722.html 在npm install时总是报如下错误, 尝试单独安装:npm install phanto ...
- python中os.path.join和join的区别
这两个函数都是python的系统函数,都有“组合”.“连接”之意,但用法和应用场景千差万别 函数说明: 1.join函数 用法:用于连接字符串数组.将字符串.元组.列表中的元素以指定的字符(即分隔符) ...
- Spring 笔记(一)概念梳理
概念 预备知识 1. POJO POJO是Plain Old Java Object的缩写,是软件开发大师Martin Fowler提出的一个概念,指的是一个普通Java类.也就说,你随便编写一个Ja ...
- 移动平台自动化测试:appium(二)
环境搭建.本环境基于win7_x64搭建 安装环境需要用到的工具清单: android sdk:https://developer.android.com/studio/index.html Appi ...
- kafka-0.9消费者新API
## kafka-0.9消费者新API 注:以下仅限kafka版本0.9以上Consumer新版api Consumer自动提交示例: Properties props = new Propertie ...
- 【bzoj2732】[HNOI2012]射箭 二分+半平面交
题目描述 给出二维平面上n个与y轴平行的线段,求最大的k,使得存在一条形如$y=ax^2+bx(a<0,b>0)$的抛物线与前k条线段均有公共点 输入 输入文件第一行是一个正整数N,表示一 ...
- POJ 2942 Knights of the Round Table 补图+tarjan求点双联通分量+二分图染色+debug
题面还好,就不描述了 重点说题解: 由于仇恨关系不好处理,所以可以搞补图存不仇恨关系, 如果一个桌子上面的人能坐到一起,显然他们满足能构成一个环 所以跑点双联通分量 求点双联通分量我用的是向栈中pus ...
- 太空飞船(spaceship)
太空飞船(spaceship) 题目描述 21XX年,秋. 小诚是THU(Tomorrow Happy University)航天学院船舶设计系本科四年级的学生.为了顺利毕业,小诚仔细阅读了这几年被引 ...
- P2659 美丽的序列 (单调栈)
题目链接 Solution 直接考虑单调栈处理出每一个点作为最小值的区间长度. 然后 \(O(n)\) 找一遍最大值即可. 记得开 long long,以及要注意 \(0\) 的问题. Code #i ...
- bzoj 4621 Tc605 思想+dp
4621: Tc605 Time Limit: 15 Sec Memory Limit: 128 MBSubmit: 328 Solved: 183[Submit][Status][Discuss ...