lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAJg=8jwijTP5fre8woS4JVJQ8iUA6v+iNcsOgtj9Zfpc3obDOQ@mail.gmail.com>
Date: Thu, 18 Apr 2024 13:11:24 -0700
From: Marius Fleischer <fleischermarius@...il.com>
To: Dave Hansen <dave.hansen@...ux.intel.com>, Andy Lutomirski <luto@...nel.org>, 
	Peter Zijlstra <peterz@...radead.org>, Thomas Gleixner <tglx@...utronix.de>, 
	Ingo Molnar <mingo@...hat.com>, Borislav Petkov <bp@...en8.de>, linux-kernel@...r.kernel.org
Cc: syzkaller@...glegroups.com, harrisonmichaelgreen@...il.com
Subject: WARNING in get_pat_info

Hi,


We would like to report the following bug which has been found by our
modified version of syzkaller.

======================================================

description: WARNING in get_pat_info

affected file: arch/x86/mm/pat/memtype.c

kernel version: 5.15.156

kernel commit: c52b9710c83d3b8ab63bb217cc7c8b61e13f12cd

git tree: upstream

kernel config: attached

crash reproducer: attached

======================================================

Crash log:

WARNING: CPU: 0 PID: 100140 at arch/x86/mm/pat/memtype.c:1020
get_pat_info+0x212/0x270 arch/x86/mm/pat/memtype.c:1020

Modules linked in:

CPU: 0 PID: 100140 Comm: syz-executor.3 Not tainted 5.15.156 #1

Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1
04/01/2014

RIP: 0010:get_pat_info+0x212/0x270 arch/x86/mm/pat/memtype.c:1020

Code: c1 ea 03 80 3c 02 00 75 71 49 89 1e eb 92 e8 25 68 42 00 0f 0b e9 9b
fe ff ff 41 bc ea ff ff ff e9 7b ff ff ff e8 0e 68 42 00 <0f> 0b 41 bc ea
ff ff ff e9 69 ff ff ff 4c 89 ff e8 d9 67 8a 00 e9

RSP: 0018:ffffc900044cf718 EFLAGS: 00010216

RAX: 000000000002315b RBX: ffff88801994db58 RCX: ffffc90004571000

RDX: 0000000000040000 RSI: ffffffff81355ee2 RDI: 0000000000000007

RBP: ffffc900044cf7d0 R08: 0000000000000000 R09: ffffc900044cf6a0

R10: 0000000000000020 R11: 0000000000086082 R12: 0000000000000028

R13: 1ffff92000899ee3 R14: 0000000000000000 R15: ffff88801994dba8

FS:  00007f786237e640(0000) GS:ffff888063e00000(0000) knlGS:0000000000000000

CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

CR2: 000000c045391000 CR3: 000000001ee0c000 CR4: 0000000000750ef0

DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000

DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400

PKRU: 55555554

Call Trace:

 <TASK>

 untrack_pfn+0xdc/0x240 arch/x86/mm/pat/memtype.c:1122

 unmap_single_vma+0x1bc/0x310 mm/memory.c:1589

 unmap_vmas+0x16d/0x2f0 mm/memory.c:1642

 exit_mmap+0x1d0/0x620 mm/mmap.c:3186

 __mmput+0x122/0x4b0 kernel/fork.c:1126

 mmput+0x58/0x60 kernel/fork.c:1147

 dup_mm kernel/fork.c:1481 [inline]

 copy_mm kernel/fork.c:1517 [inline]

 copy_process+0x7ca5/0x8730 kernel/fork.c:2206

 kernel_clone+0xe7/0x9f0 kernel/fork.c:2604

 __do_sys_clone+0xc8/0x110 kernel/fork.c:2721

 do_syscall_x64 arch/x86/entry/common.c:50 [inline]

 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80

 entry_SYSCALL_64_after_hwframe+0x66/0xd0

RIP: 0033:0x7f7863e0ed2d

Code: c3 e8 97 2b 00 00 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7
48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff
ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48

RSP: 002b:00007f786237dfd8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038

RAX: ffffffffffffffda RBX: 00007f7863f4bf80 RCX: 00007f7863e0ed2d

RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000024080

RBP: 00007f786237e0a0 R08: 0000000000000000 R09: 0000000000000000

R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000002

R13: 000000000000000b R14: 00007f7863f4bf80 R15: 00007f786235e000

 </TASK>

======================================================

Please note, I used the crashing location to identify relevant
maintainers/mailing lists. I hope that is the correct approach in this
case. I apologize in case it is not and would appreciate your help in
getting the report to the right people/mailing list.

>From a very brief look, it appears as if one of the two
anon_vma_chain_alloc calls in mm/rmap.c fails which leads to this warning.
I was not able to understand the connection between this allocation failure
and the resulting warning though.

The attached reproducer is in syzlang format. Please find instructions on
how to execute the reproducer here:
https://github.com/google/syzkaller/blob/master/docs/executing_syzkaller_programs.md

Here is also the command we used to execute the reproducer:

/syz-execprog -executor=./syz-executor -procs=8 -repeat=0 repro.syz


Kind regards,

Marius

Content of type "text/html" skipped

Download attachment "repro.syz" of type "application/octet-stream" (115 bytes)

Download attachment "config" of type "application/octet-stream" (227013 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ