lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Fri, 20 Dec 2013 19:33:10 -0500
From:	Sasha Levin <sasha.levin@...cle.com>
To:	Rusty Russell <rusty@...tcorp.com.au>
CC:	Al Viro <viro@...IV.linux.org.uk>, linux-fsdevel@...r.kernel.org,
	LKML <linux-kernel@...r.kernel.org>
Subject: Re: module: BUG in copy_module_from_fd

On 12/20/2013 06:40 PM, Sasha Levin wrote:
> Hi all,
>
> While fuzzing with trinity inside a KVM tools guest running latest -next kernel, I've stumbled on
> the following spew.
>
> This reproduced twice with the same call trace, so I suspect it's something specific with the way
> the module subsystem calls vfs_getattr rather than something odd in vfs.

Sorry, forget that. Just got one that has nothing to do with modules:

BUG: unable to handle kernel paging request at ffff880429d40010
[ 2935.385056] IP: [<ffffffff812d792d>] generic_fillattr+0xd/0xa0
[ 2935.386268] PGD 857a067 PUD 857d067 PMD 42fe93067 PTE 8000000429d40060
[ 2935.387998] Oops: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC
[ 2935.389936] Dumping ftrace buffer:
[ 2935.390321]    (ftrace buffer empty)
[ 2935.390321] Modules linked in:
[ 2935.390321] CPU: 22 PID: 57475 Comm: trinity-c598 Tainted: G        W    3.13.0-rc4-
next-20131220-sasha-00014-gd62f590-dirty #2
[ 2935.390321] task: ffff88005d880000 ti: ffff88004e3be000 task.ti: ffff88004e3be000
[ 2935.390321] RIP: 0010:[<ffffffff812d792d>]  [<ffffffff812d792d>] generic_fillattr+0x
d/0xa0
[ 2935.390321] RSP: 0018:ffff88004e3bfe58  EFLAGS: 00010246
[ 2935.390321] RAX: ffff880429d40000 RBX: ffff88015bf9e5d0 RCX: ffff88015b700a20
[ 2935.390321] RDX: 0000000000000000 RSI: ffff88004e3bfee8 RDI: ffff88042a078550
[ 2935.390321] RBP: ffff88004e3bfe58 R08: ffff88042a078550 R09: 0000000000000000
[ 2935.390321] R10: 0000000000000001 R11: 0000000000000000 R12: ffff88004e3bfee8
[ 2935.390321] R13: ffff88004e3bfee8 R14: 0000000000000000 R15: 0000000000000010
[ 2935.390321] FS:  00007ff7f4855700(0000) GS:ffff880161a00000(0000) knlGS:000000000000
0000
[ 2935.390321] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 2935.390321] CR2: ffff880429d40010 CR3: 0000000035487000 CR4: 00000000000006e0
[ 2935.390321] Stack:
[ 2935.390321]  ffff88004e3bfe68 ffffffff812d79f8 ffff88004e3bfe88 ffffffff812d7fe7
[ 2935.390321]  ffff88015bf9e5c0 0000000000000000 ffff88004e3bfed8 ffffffff812d81f2
[ 2935.390321]  ffff88004e3bfeb8 ffff88005d880000 ffffffff81249435 0000000000000256
[ 2935.390321] Call Trace:
[ 2935.390321]  [<ffffffff812d79f8>] vfs_getattr_nosec+0x38/0x40
[ 2935.390321]  [<ffffffff812d7fe7>] vfs_getattr+0x37/0x50
[ 2935.390321]  [<ffffffff812d81f2>] vfs_fstat+0x42/0x70
[ 2935.390321]  [<ffffffff81249435>] ? context_tracking_user_exit+0x195/0x1d0
[ 2935.390321]  [<ffffffff812d852f>] SYSC_newfstat+0x1f/0x40
[ 2935.390321]  [<ffffffff8119302d>] ? trace_hardirqs_on+0xd/0x10
[ 2935.390321]  [<ffffffff8107a852>] ? syscall_trace_enter+0x32/0x290
[ 2935.390321]  [<ffffffff843b5ef1>] ? tracesys+0x7e/0xe2
[ 2935.390321]  [<ffffffff812d855e>] SyS_newfstat+0xe/0x10
[ 2935.390321]  [<ffffffff843b5f50>] tracesys+0xdd/0xe2

Thanks,
Sasha
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ