[systemd-devel] Memory leak in systemd on i686

Michael Tremer michael.tremer at ipfire.org
Tue Jan 29 04:35:14 PST 2013


Thank you very much for investigating this and sorry for the trouble at
the systemd guys.

I'll check if the next patch.

Thanks again,
-Michael

On Mon, 2013-01-28 at 19:56 +0200, PaX Team wrote:
> On 28 Jan 2013 at 19:21, Michael Tremer wrote:
> 
> > Right when the system boots up, the PaX-enabled kernel panics because it
> > apparently has found a memory leak in systemd. You can see the message
> > that the kernel dumps in the attached screenshot and Stefan also got me
> > an strace dump. In order to make that dump, he had to manually start
> > systemd on the console.
> 
> it's a false positive from USERCOPY when fs/fhandle.c:do_sys_name_to_handle 
> (in 3.7.x) does this:
> 
> 	copy_to_user(mnt_id, &real_mount(path->mnt)->mnt_id, sizeof(*mnt_id))
> 
> here ->mnt_id is a struct mount instance which is allocated from a special
> slab and is not marked for USERCOPY access, hence the runtime report. this
> looks like a harmless infoleak so no further action is needed beyond the
> obvious and simple fix: the ->mnt_id field has to be copied to a temporary
> variable which can then be safely copied to userland, i'll do that in the
> next patch.
> 



More information about the systemd-devel mailing list