lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <001a1144b44a9a3e6b0562000ab5@google.com>
Date:   Thu, 04 Jan 2018 20:40:00 -0800
From:   syzbot <syzbot+3902b5220e8ca27889ca@...kaller.appspotmail.com>
To:     alsa-devel-bounces@...a-project.org, alsa-devel@...a-project.org,
        linux-kernel@...r.kernel.org, mail@...iej.szmigiero.name,
        o-takashi@...amocchi.jp, perex@...ex.cz,
        syzkaller-bugs@...glegroups.com, tiwai@...e.com
Subject: BUG: unable to handle kernel paging request in memset_erms

syzkaller has found reproducer for the following crash on  
73005e1a35fd67c644b0645c9e4c1efabd0fe62c
git://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/master
compiler: gcc (GCC) 7.1.1 20170620
.config is attached
Raw console output is attached.
C reproducer is attached
syzkaller reproducer is attached. See https://goo.gl/kgGztJ
for information about syzkaller reproducers


IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+3902b5220e8ca27889ca@...kaller.appspotmail.com
It will help syzbot understand when the bug is fixed.

BUG: unable to handle kernel paging request at ffffc90001a91000
IP: memset_erms+0x9/0x10 arch/x86/lib/memset_64.S:65
PGD 1db12c067 P4D 1db12c067 PUD 1db12d067 PMD 1c02b7067 PTE 0
Oops: 0002 [#1] SMP KASAN
Dumping ftrace buffer:
    (ftrace buffer empty)
Modules linked in:
CPU: 0 PID: 3628 Comm: syzkaller980128 Not tainted  
4.15.0-rc6-next-20180103+ #87
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS  
Google 01/01/2011
RIP: 0010:memset_erms+0x9/0x10 arch/x86/lib/memset_64.S:65
RSP: 0018:ffff8801bfa878d8 EFLAGS: 00010246
RAX: fffff52004352080 RBX: ffffc90001a9001f RCX: 000000001ffff010
RDX: 000000001ffffff1 RSI: 0000000000000080 RDI: ffffc90001a91000
RBP: ffff8801bfa878f8 R08: fffff52004352002 R09: ffffc90001a9001f
R10: 0000000000000000 R11: fffff52004352001 R12: 000000001ffffff1
R13: 0000000000000080 R14: ffffffff8646aed0 R15: 0000000000000008
FS:  0000000000000000(0000) GS:ffff8801db400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffc90001a91000 CR3: 0000000005e22001 CR4: 00000000001606f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
  memset include/linux/string.h:329 [inline]
  snd_pcm_format_set_silence+0x13f/0x4b0 sound/core/pcm_misc.c:431
  snd_pcm_oss_sync+0x4c3/0x710 sound/core/oss/pcm_oss.c:1587
  snd_pcm_oss_release+0x20b/0x280 sound/core/oss/pcm_oss.c:2430
  __fput+0x291/0x6e0 fs/file_table.c:209
  ____fput+0x15/0x20 fs/file_table.c:243
  task_work_run+0x122/0x1a0 kernel/task_work.c:113
  exit_task_work include/linux/task_work.h:22 [inline]
  do_exit+0x7f4/0x2da0 kernel/exit.c:869
  do_group_exit+0x108/0x320 kernel/exit.c:972
  get_signal+0x5e9/0x1460 kernel/signal.c:2337
  do_signal+0x7f/0x1980 arch/x86/kernel/signal.c:809
  exit_to_usermode_loop+0x1aa/0x210 arch/x86/entry/common.c:161
  prepare_exit_to_usermode arch/x86/entry/common.c:195 [inline]
  syscall_return_slowpath+0x383/0x430 arch/x86/entry/common.c:264
  entry_SYSCALL_64_fastpath+0x98/0x9a
RIP: 0033:0x449bc9
RSP: 002b:00007feb51184da8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: fffffffffffffe00 RBX: 00000000006dbc3c RCX: 0000000000449bc9
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000006dbc3c
RBP: 00000000006dbc38 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 234423436d63702f
R13: 646e732f7665642f R14: 7073642f7665642f R15: 000000000000000b
Code: 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3  
48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 <f3> aa 4c 89  
c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01
RIP: memset_erms+0x9/0x10 arch/x86/lib/memset_64.S:65 RSP: ffff8801bfa878d8
CR2: ffffc90001a91000
---[ end trace 834aab368228904d ]---


View attachment "config.txt" of type "text/plain" (134059 bytes)

Download attachment "raw.log" of type "application/octet-stream" (9536 bytes)

View attachment "repro.txt" of type "text/plain" (992 bytes)

Download attachment "repro.c" of type "application/octet-stream" (5956 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ