lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20080827214652.GA32163@x200.localdomain>
Date:	Thu, 28 Aug 2008 01:46:52 +0400
From:	Alexey Dobriyan <adobriyan@...il.com>
To:	Roland McGrath <roland@...hat.com>
Cc:	Linus Torvalds <torvalds@...ux-foundation.org>,
	Andrew Morton <akpm@...ux-foundation.org>,
	linux-kernel@...r.kernel.org
Subject: Re: [PATCH 1/2] utrace core

On Thu, Aug 28, 2008 at 01:32:11AM +0400, Alexey Dobriyan wrote:
> > And run to confirm that attach/detach/exec program still crashes it.
> > There is PREEMPT_RCU now so it will be even more not funny.
> 
> As promised, quickly reproducible via expt_ptratt.c:

Another one:

kernel BUG at kernel/utrace.c:2275!
invalid opcode: 0000 [1] PREEMPT SMP DEBUG_PAGEALLOC
last sysfs file: /sys/kernel/slab/utrace_attached_engine/objects
CPU 0 
Modules linked in: xt_state iptable_filter ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack ip_tables xt_tcpudp ip6table_filter ip6_tables x_tables ipv6 sr_mod cdrom
Pid: 5118, comm: exe Tainted: G        W 2.6.27-rc4-next-20080827-utrace #5
RIP: 0010:[<ffffffff802608ef>]  [<ffffffff802608ef>] utrace_get_signal+0x6ff/0x710
RSP: 0018:ffff88017ace5c98  EFLAGS: 00010093
RAX: 0000000000000000 RBX: ffff88017aced910 RCX: ffff88017e2b23c0
RDX: ffffffffffffffff RSI: ffff88017ace5cf8 RDI: ffff88017acc5640
RBP: ffff88017ace5d38 R08: 0000000000000002 R09: 0000000000000001
R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000
R13: ffff88017aced908 R14: ffff88017aced900 R15: ffff88017acc5640
FS:  0000000000000000(0000) GS:ffffffff80551600(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 00007fff249c8bc9 CR3: 000000017ad2c000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process exe (pid: 5118, threadinfo ffff88017ace4000, task ffff88017acc5640)
Stack:  ffff88017ace5ef8 0000000000000002 0000000000000000 ffff88017ace5ef8
 ffff88017ace5e78 ffff88017ace5f58 ffff88017e206288 0000000000000400
 0000000000000401 ffff88017e206848 0000001000000000 0000000000010000
Call Trace:
 [<ffffffff802412fc>] get_signal_to_deliver+0x24c/0x310
 [<ffffffff8020ab54>] do_notify_resume+0xd4/0x860
 [<ffffffff8028ff08>] ? check_bytes_and_report+0x38/0xd0
 [<ffffffff80209b7b>] ? sys_execve+0x5b/0x80
 [<ffffffff802901c3>] ? check_object+0x223/0x250
 [<ffffffff80290811>] ? init_object+0x51/0x90
 [<ffffffff80256f5d>] ? trace_hardirqs_on+0xd/0x10
 [<ffffffff80209b7b>] ? sys_execve+0x5b/0x80
 [<ffffffff8020b9c7>] int_signal+0x12/0x17
Code: 00 00 48 89 41 10 48 8b 82 20 01 00 00 48 89 41 18 e9 5e fa ff ff 0f 0b eb fe 48 8b 75 80 4c 89 ff e8 e6 e5 ff ff e9 28 fd ff ff <0f> 0b eb fe 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 
RIP  [<ffffffff802608ef>] utrace_get_signal+0x6ff/0x710
 RSP <ffff88017ace5c98>
---[ end trace 4eaa2a86a8e2da22 ]---

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ