lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <000000000000b8643205f52ec9bf@google.com>
Date:   Mon, 20 Feb 2023 21:09:45 -0800
From:   syzbot <syzbot+dac365e3ce07c3d0e496@...kaller.appspotmail.com>
To:     dvyukov@...gle.com, jpoimboe@...nel.org, jpoimboe@...hat.com,
        linux-kernel@...r.kernel.org, mingo@...nel.org,
        peterz@...radead.org, syzkaller-bugs@...glegroups.com
Subject: Re: [syzbot] WARNING: can't access registers at entry_SYSCALL_64_after_hwframe

syzbot has found a reproducer for the following issue on:

HEAD commit:    d2af0fa4bfa4 Add linux-next specific files for 20230220
git tree:       linux-next
console output: https://syzkaller.appspot.com/x/log.txt?x=109146a0c80000
kernel config:  https://syzkaller.appspot.com/x/.config?x=594e1a56901fd35d
dashboard link: https://syzkaller.appspot.com/bug?extid=dac365e3ce07c3d0e496
compiler:       gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2
syz repro:      https://syzkaller.appspot.com/x/repro.syz?x=10b9f4d8c80000
C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=138179e8c80000

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/83b78c113e8e/disk-d2af0fa4.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/d59f9b2c9091/vmlinux-d2af0fa4.xz
kernel image: https://storage.googleapis.com/syzbot-assets/2726c16c1d3b/bzImage-d2af0fa4.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+dac365e3ce07c3d0e496@...kaller.appspotmail.com

WARNING: can't access registers at entry_SYSCALL_64_after_hwframe+0x63/0xcd

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ