lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <alpine.DEB.2.10.1601201536040.18155@chino.kir.corp.google.com>
Date:	Wed, 20 Jan 2016 15:37:33 -0800 (PST)
From:	David Rientjes <rientjes@...gle.com>
To:	Mika Penttilä <mika.penttila@...tfour.com>
cc:	LKML <linux-kernel@...r.kernel.org>, linux-mm@...ck.org,
	Pekka Enberg <penberg@...nel.org>,
	Rusty Russell <rusty@...tcorp.com.au>
Subject: Re: [PATCH v2] mm: make apply_to_page_range more robust

On Wed, 20 Jan 2016, Mika Penttilä wrote:

> Recent changes (4.4.0+) in module loader triggered oops on ARM. 
>     
> can be 0 triggering the bug  BUG_ON(addr >= end);.
> 
> The call path is SyS_init_module()->set_memory_xx()->apply_to_page_range(),
> and apply_to_page_range gets zero length resulting in triggering :
>    
>   BUG_ON(addr >= end)
> 
> This is a consequence of changes in module section handling (Rusty CC:ed).
> This may be triggable only with certain modules and/or gcc versions. 
> 

Well, what module are you loading to cause this crash?  Why would it be 
passing size == 0 to apply_to_page_range()?  Again, that sounds like a 
problem that we _want_ to know about since it is probably the result of 
buggy code and this patch would be covering it up.

Please elaborate on the problem that you are seeing, preferably with a 
stack trace of the BUG so we can fix the problem instead of papering over 
it.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ