lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <BB6267EA-85B0-46D1-B661-B62DC4984FC9@gmail.com>
Date: Sun, 16 Jun 2024 14:29:15 -0400
From: Shuangpeng Bai <shuangpengbai@...il.com>
To: shaggy@...nel.org,
 osmtendev@...il.com,
 ghandatmanas@...il.com
Cc: linux-kernel@...r.kernel.org
Subject: Follow-Up on Reported Kernel Bug KASAN: slab-use-after-free in
 jfs_readdir 


Dear Kernel Maintainers,

I hope this message finds you well.

I am writing to follow up on the recent bug report KASAN: slab-use-after-free in jfs_readdir. I was wondering if there have been any updates or progress on this issue. Additionally, please let me know if there is any assistance I can provide.

Thank you for your time and attention to this matter.

Best regards,
Shuangpeng

> On May 21, 2024, at 23:37, Shuangpeng Bai <shuangpengbai@...il.com> wrote:
> 
> Hi Kernel Maintainers,
> 
> Our tool found a kernel bug KASAN: slab-use-after-free in jfs_readdir. Please see the details below.
> 
> Kernel commit: v6.9 (Commits on May 12, 2024)
> Kernel config: attachment
> C/Syz reproducer: attachment
> 
> Please let me know for anything I can help.
> 
> Best,
> Shuangpeng
> 
> 
> [   99.923868][ T8134] ==================================================================
> [ 99.927244][ T8134] BUG: KASAN: slab-use-after-free in jfs_readdir (fs/jfs/jfs_dtree.c:2867) 
> [   99.930329][ T8134] Read of size 8 at addr ffff888015b4b030 by task a.out/8134
> [   99.932158][ T8134]
> [   99.932758][ T8134] CPU: 0 PID: 8134 Comm: a.out Not tainted 6.9.0 #8
> [   99.934454][ T8134] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
> [   99.936720][ T8134] Call Trace:
> [   99.937548][ T8134]  <TASK>
> [ 99.938278][ T8134] dump_stack_lvl (lib/dump_stack.c:117) 
> [ 99.940734][ T8134] print_report (mm/kasan/report.c:378 mm/kasan/report.c:488) 
> [ 99.941776][ T8134] ? __phys_addr (arch/x86/mm/physaddr.c:32 (discriminator 4)) 
> [ 99.942884][ T8134] ? jfs_readdir (fs/jfs/jfs_dtree.c:2867) 
> [ 99.944073][ T8134] kasan_report (mm/kasan/report.c:603) 
> [ 99.945162][ T8134] ? jfs_readdir (fs/jfs/jfs_dtree.c:2867) 
> [ 99.946340][ T8134] jfs_readdir (fs/jfs/jfs_dtree.c:2867) 
> [ 99.947428][ T8134] ? __x64_sys_openat (fs/open.c:1432) 
> [ 99.948441][ T8134] ? entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) 
> [ 99.949671][ T8134] ? __pfx_path_openat (fs/namei.c:3781) 
> [ 99.950690][ T8134] ? __pfx__raw_spin_lock_irqsave (kernel/locking/spinlock.c:161) 
> [ 99.951849][ T8134] ? page_table_check_set (mm/page_table_check.c:126 mm/page_table_check.c:97) 
> [ 99.952953][ T8134] ? __pfx_jfs_readdir (fs/jfs/jfs_dtree.c:2701) 
> [ 99.954027][ T8134] ? debug_check_no_obj_freed (lib/debugobjects.c:1000 lib/debugobjects.c:1019) 
> [ 99.955184][ T8134] ? _raw_spin_lock (./arch/x86/include/asm/atomic.h:115 ./include/linux/atomic/atomic-arch-fallback.h:2170 ./include/linux/atomic/atomic-instrumented.h:1302 ./include/asm-generic/qspinlock.h:111 ./include/linux/spinlock.h:187 ./include/linux/spinlock_api_smp.h:134 kernel/locking/spinlock.c:154) 
> [ 99.956205][ T8134] ? putname (fs/namei.c:274) 
> [ 99.957098][ T8134] ? down_write (./arch/x86/include/asm/preempt.h:103 kernel/locking/rwsem.c:1309 kernel/locking/rwsem.c:1315 kernel/locking/rwsem.c:1580) 
> [ 99.958044][ T8134] ? __pfx_down_write (kernel/locking/rwsem.c:1577) 
> [ 99.959308][ T8134] ? down_read_killable (./arch/x86/include/asm/preempt.h:103 kernel/locking/rwsem.c:1257 kernel/locking/rwsem.c:1273 kernel/locking/rwsem.c:1551) 
> [ 99.960630][ T8134] ? __pfx_down_read_killable (kernel/locking/rwsem.c:1547) 
> [ 99.961940][ T8134] ? selinux_file_permission (security/selinux/hooks.c:3643) 
> [ 99.963309][ T8134] ? __pfx_jfs_readdir (fs/jfs/jfs_dtree.c:2701) 
> [ 99.964537][ T8134] wrap_directory_iterator (fs/readdir.c:67) 
> [ 99.965930][ T8134] iterate_dir (fs/readdir.c:111) 
> [ 99.967099][ T8134] __x64_sys_getdents64 (fs/readdir.c:410 fs/readdir.c:394 fs/readdir.c:394) 
> [ 99.968427][ T8134] ? __pfx___x64_sys_getdents64 (fs/readdir.c:394) 
> [ 99.969867][ T8134] ? mutex_unlock (./arch/x86/include/asm/atomic64_64.h:109 ./include/linux/atomic/atomic-arch-fallback.h:4329 ./include/linux/atomic/atomic-long.h:1506 ./include/linux/atomic/atomic-instrumented.h:4481 kernel/locking/mutex.c:181 kernel/locking/mutex.c:545) 
> [ 99.970927][ T8134] ? __pfx_filldir64 (fs/readdir.c:352) 
> [ 99.972073][ T8134] ? fpregs_assert_state_consistent (arch/x86/kernel/fpu/context.h:38 arch/x86/kernel/fpu/core.c:822) 
> [ 99.973562][ T8134] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) 
> [ 99.974580][ T8134] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) 
> [   99.975780][ T8134] RIP: 0033:0x7fd5a43b473d
> [ 99.976695][ T8134] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 78
> All code
> ========
>   0: 00 c3                 add    %al,%bl
>   2: 66 2e 0f 1f 84 00 00 cs nopw 0x0(%rax,%rax,1)
>   9: 00 00 00 
>   c: 90                    nop
>   d: f3 0f 1e fa           endbr64 
>  11: 48 89 f8              mov    %rdi,%rax
>  14: 48 89 f7              mov    %rsi,%rdi
>  17: 48 89 d6              mov    %rdx,%rsi
>  1a: 48 89 ca              mov    %rcx,%rdx
>  1d: 4d 89 c2              mov    %r8,%r10
>  20: 4d 89 c8              mov    %r9,%r8
>  23: 4c 8b 4c 24 08        mov    0x8(%rsp),%r9
>  28: 0f 05                 syscall 
>  2a:* 48 3d 01 f0 ff ff     cmp    $0xfffffffffffff001,%rax <-- trapping instruction
>  30: 78                    .byte 0x78
> 
> Code starting with the faulting instruction
> ===========================================
>   0: 48 3d 01 f0 ff ff     cmp    $0xfffffffffffff001,%rax
>   6: 78                    .byte 0x78
> [   99.980674][ T8134] RSP: 002b:00007ffc8e81ca28 EFLAGS: 00000203 ORIG_RAX: 00000000000000d9
> [   99.982594][ T8134] RAX: ffffffffffffffda RBX: 00005616907c2360 RCX: 00007fd5a43b473d
> [   99.984540][ T8134] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004
> [   99.986532][ T8134] RBP: 00007ffc8e81ca40 R08: 00007ffc8e81cb30 R09: 00007ffc8e81cb30
> [   99.988451][ T8134] R10: 00007ffc8e81cb30 R11: 0000000000000203 R12: 00005616907c03c0
> [   99.990408][ T8134] R13: 00007ffc8e81cb30 R14: 0000000000000000 R15: 0000000000000000
> [   99.992446][ T8134]  </TASK>
> [   99.993198][ T8134]
> [   99.993769][ T8134] Allocated by task 8101:
> [ 99.994870][ T8134] kasan_save_stack (mm/kasan/common.c:48) 
> [ 99.996017][ T8134] kasan_save_track (./arch/x86/include/asm/current.h:49 mm/kasan/common.c:60 mm/kasan/common.c:69) 
> [ 99.997094][ T8134] __kasan_slab_alloc (mm/kasan/common.c:341) 
> [ 99.998119][ T8134] kmem_cache_alloc (mm/slub.c:3805 mm/slub.c:3851 mm/slub.c:3858) 
> [ 99.999428][ T8134] mempool_alloc (mm/mempool.c:409) 
> [ 100.001222][ T8134] __get_metapage (fs/jfs/jfs_metapage.c:178 fs/jfs/jfs_metapage.c:651) 
> [ 100.003051][ T8134] dtSplitRoot (fs/jfs/jfs_dtree.c:1908 (discriminator 3)) 
> [ 100.004820][ T8134] dtSplitUp (fs/jfs/jfs_dtree.c:992) 
> [ 100.006625][ T8134] dtInsert (fs/jfs/jfs_dtree.c:868) 
> [ 100.008164][ T8134] jfs_create (fs/jfs/namei.c:137) 
> [ 100.009763][ T8134] path_openat (fs/namei.c:3499 fs/namei.c:3566 fs/namei.c:3796) 
> [ 100.011622][ T8134] do_filp_open (fs/namei.c:3827) 
> [ 100.013413][ T8134] do_sys_openat2 (fs/open.c:1407) 
> [ 100.015181][ T8134] __x64_sys_openat (fs/open.c:1432) 
> [ 100.016978][ T8134] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) 
> [ 100.018664][ T8134] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) 
> [  100.020899][ T8134]
> [  100.021806][ T8134] Freed by task 8134:
> [ 100.023259][ T8134] kasan_save_stack (mm/kasan/common.c:48) 
> [ 100.025141][ T8134] kasan_save_track (./arch/x86/include/asm/current.h:49 mm/kasan/common.c:60 mm/kasan/common.c:69) 
> [ 100.027001][ T8134] kasan_save_free_info (mm/kasan/generic.c:582) 
> [ 100.028923][ T8134] __kasan_slab_free (mm/kasan/common.c:274) 
> [ 100.030752][ T8134] kmem_cache_free (mm/slub.c:4286 mm/slub.c:4350) 
> [ 100.032665][ T8134] mempool_free (mm/mempool.c:555) 
> [ 100.034385][ T8134] release_metapage (fs/jfs/jfs_metapage.c:788) 
> [ 100.036318][ T8134] jfs_readdir (fs/jfs/jfs_dtree.c:3172 fs/jfs/jfs_dtree.c:2860) 
> [ 100.038083][ T8134] wrap_directory_iterator (fs/readdir.c:67) 
> [ 100.040219][ T8134] iterate_dir (fs/readdir.c:111) 
> [ 100.042567][ T8134] __x64_sys_getdents64 (fs/readdir.c:410 fs/readdir.c:394 fs/readdir.c:394) 
> [ 100.044639][ T8134] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) 
> [ 100.046310][ T8134] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) 
> [  100.048685][ T8134]
> [  100.049566][ T8134] The buggy address belongs to the object at ffff888015b4b000
> [  100.049566][ T8134]  which belongs to the cache jfs_mp of size 128
> [  100.054906][ T8134] The buggy address is located 48 bytes inside of
> [  100.054906][ T8134]  freed 128-byte region [ffff888015b4b000, ffff888015b4b080)
> [  100.059909][ T8134]
> [  100.060839][ T8134] The buggy address belongs to the physical page:
> [  100.063438][ T8134] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x15b4b
> [  100.066660][ T8134] flags: 0xfff00000000800(slab|node=0|zone=1|lastcpupid=0x7ff)
> [  100.069588][ T8134] page_type: 0xffffffff()
> [  100.071264][ T8134] raw: 00fff00000000800 ffff8881462b5140 dead000000000122 0000000000000000
> [  100.074666][ T8134] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000
> [  100.077860][ T8134] page dumped because: kasan: bad access detected
> [  100.084408][ T8134] page_owner tracks the page as allocated
> [  100.085611][ T8134] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x92800(GFP_NOWAIT|__GFP_NORETRY|__GFP_NOMEMALLOC), pid 8101, tgid 8101 (a.out), ts 85516
> [ 100.089422][ T8134] post_alloc_hook (./include/linux/page_owner.h:32 mm/page_alloc.c:1534) 
> [ 100.090456][ T8134] get_page_from_freelist (mm/page_alloc.c:1543 mm/page_alloc.c:3317) 
> [ 100.091556][ T8134] __alloc_pages (mm/page_alloc.c:4576) 
> [ 100.092516][ T8134] allocate_slab (mm/slub.c:2181 mm/slub.c:2343) 
> [ 100.094078][ T8134] ___slab_alloc (mm/slub.c:3531) 
> [ 100.095051][ T8134] __slab_alloc.constprop.0 (mm/slub.c:3615) 
> [ 100.096199][ T8134] kmem_cache_alloc (mm/slub.c:3668 mm/slub.c:3841 mm/slub.c:3858) 
> [ 100.097220][ T8134] mempool_alloc (mm/mempool.c:409) 
> [ 100.098198][ T8134] __get_metapage (fs/jfs/jfs_metapage.c:178 fs/jfs/jfs_metapage.c:651) 
> [ 100.099189][ T8134] dtSplitRoot (fs/jfs/jfs_dtree.c:1908 (discriminator 3)) 
> [ 100.100170][ T8134] dtSplitUp (fs/jfs/jfs_dtree.c:992) 
> [ 100.101104][ T8134] dtInsert (fs/jfs/jfs_dtree.c:868) 
> [ 100.101958][ T8134] jfs_create (fs/jfs/namei.c:137) 
> [ 100.102871][ T8134] path_openat (fs/namei.c:3499 fs/namei.c:3566 fs/namei.c:3796) 
> [ 100.103852][ T8134] do_filp_open (fs/namei.c:3827) 
> [ 100.104830][ T8134] do_sys_openat2 (fs/open.c:1407) 
> [  100.105871][ T8134] page last free pid 8101 tgid 8101 stack trace:
> [ 100.107227][ T8134] free_unref_page_prepare (./include/linux/page_owner.h:25 mm/page_alloc.c:1141 mm/page_alloc.c:2347) 
> [ 100.108596][ T8134] free_unref_folios (mm/page_alloc.c:2536) 
> [ 100.109856][ T8134] folios_put_refs (mm/swap.c:1034) 
> [ 100.111000][ T8134] free_pages_and_swap_cache (mm/swap_state.c:329) 
> [ 100.112311][ T8134] __tlb_batch_free_encoded_pages (mm/mmu_gather.c:137) 
> [ 100.113623][ T8134] tlb_finish_mmu (mm/mmu_gather.c:148 mm/mmu_gather.c:366 mm/mmu_gather.c:373 mm/mmu_gather.c:465) 
> [ 100.114741][ T8134] unmap_region (mm/mmap.c:2303 (discriminator 8)) 
> [ 100.115892][ T8134] do_vmi_align_munmap (./include/linux/instrumented.h:96 ./include/linux/atomic/atomic-instrumented.h:435 ./include/linux/maple_tree.h:719 ./include/linux/maple_tree.h:739 ./include/linux/maple_tree.h:754 mm/mmap.c:2631) 
> [ 100.117053][ T8134] do_vmi_munmap (mm/mmap.c:2696) 
> [ 100.118168][ T8134] __vm_munmap (mm/mmap.c:2973) 
> [ 100.119257][ T8134] __x64_sys_munmap (mm/mmap.c:2986) 
> [ 100.120429][ T8134] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) 
> [ 100.121550][ T8134] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) 
> [  100.123223][ T8134]
> [  100.123801][ T8134] Memory state around the buggy address:
> [  100.125169][ T8134]  ffff888015b4af00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
> [  100.126886][ T8134]  ffff888015b4af80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
> [  100.128502][ T8134] >ffff888015b4b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
> [  100.130113][ T8134]                                      ^
> [  100.131238][ T8134]  ffff888015b4b080: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
> [  100.133164][ T8134]  ffff888015b4b100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
> [  100.134828][ T8134] ==================================================================
> [  100.151463][ T8134] Kernel panic - not syncing: KASAN: panic_on_warn set ...
> [  100.153291][ T8134] CPU: 1 PID: 8134 Comm: a.out Not tainted 6.9.0 #8
> [  100.154827][ T8134] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
> [  100.167902][ T8134] Call Trace:
> [  100.168696][ T8134]  <TASK>
> [ 100.169393][ T8134] dump_stack_lvl (lib/dump_stack.c:118 (discriminator 4)) 
> [ 100.170478][ T8134] panic (kernel/panic.c:348) 
> [ 100.171389][ T8134] ? __pfx_panic (kernel/panic.c:282) 
> [ 100.172412][ T8134] ? preempt_schedule_thunk (arch/x86/entry/thunk_64.S:12) 
> [ 100.173697][ T8134] ? preempt_schedule_common (./arch/x86/include/asm/preempt.h:84 kernel/sched/core.c:6927) 
> [ 100.175009][ T8134] ? check_panic_on_warn (kernel/panic.c:240) 
> [ 100.176172][ T8134] ? jfs_readdir (fs/jfs/jfs_dtree.c:2867) 
> [ 100.177262][ T8134] check_panic_on_warn (kernel/panic.c:241) 
> [ 100.178420][ T8134] end_report (mm/kasan/report.c:226) 
> [ 100.179385][ T8134] kasan_report (./arch/x86/include/asm/smap.h:56 mm/kasan/report.c:606) 
> [ 100.180334][ T8134] ? jfs_readdir (fs/jfs/jfs_dtree.c:2867) 
> [ 100.181430][ T8134] jfs_readdir (fs/jfs/jfs_dtree.c:2867) 
> [ 100.182446][ T8134] ? __x64_sys_openat (fs/open.c:1432) 
> [ 100.183564][ T8134] ? entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) 
> [ 100.184891][ T8134] ? __pfx_path_openat (fs/namei.c:3781) 
> [ 100.185956][ T8134] ? __pfx__raw_spin_lock_irqsave (kernel/locking/spinlock.c:161) 
> [ 100.187271][ T8134] ? page_table_check_set (mm/page_table_check.c:126 mm/page_table_check.c:97) 
> [ 100.188421][ T8134] ? __pfx_jfs_readdir (fs/jfs/jfs_dtree.c:2701) 
> [ 100.189486][ T8134] ? debug_check_no_obj_freed (lib/debugobjects.c:1000 lib/debugobjects.c:1019) 
> [ 100.190742][ T8134] ? _raw_spin_lock (./arch/x86/include/asm/atomic.h:115 ./include/linux/atomic/atomic-arch-fallback.h:2170 ./include/linux/atomic/atomic-instrumented.h:1302 ./include/asm-generic/qspinlock.h:111 ./include/linux/spinlock.h:187 ./include/linux/spinlock_api_smp.h:134 kernel/locking/spinlock.c:154) 
> [ 100.191793][ T8134] ? putname (fs/namei.c:274) 
> [ 100.192661][ T8134] ? down_write (./arch/x86/include/asm/preempt.h:103 kernel/locking/rwsem.c:1309 kernel/locking/rwsem.c:1315 kernel/locking/rwsem.c:1580) 
> [ 100.193513][ T8134] ? __pfx_down_write (kernel/locking/rwsem.c:1577) 
> [ 100.194537][ T8134] ? down_read_killable (./arch/x86/include/asm/preempt.h:103 kernel/locking/rwsem.c:1257 kernel/locking/rwsem.c:1273 kernel/locking/rwsem.c:1551) 
> [ 100.195660][ T8134] ? __pfx_down_read_killable (kernel/locking/rwsem.c:1547) 
> [ 100.196844][ T8134] ? selinux_file_permission (security/selinux/hooks.c:3643) 
> [ 100.198212][ T8134] ? __pfx_jfs_readdir (fs/jfs/jfs_dtree.c:2701) 
> [ 100.199278][ T8134] wrap_directory_iterator (fs/readdir.c:67) 
> [ 100.200487][ T8134] iterate_dir (fs/readdir.c:111) 
> [ 100.201542][ T8134] __x64_sys_getdents64 (fs/readdir.c:410 fs/readdir.c:394 fs/readdir.c:394) 
> [ 100.202668][ T8134] ? __pfx___x64_sys_getdents64 (fs/readdir.c:394) 
> [ 100.204027][ T8134] ? mutex_unlock (./arch/x86/include/asm/atomic64_64.h:109 ./include/linux/atomic/atomic-arch-fallback.h:4329 ./include/linux/atomic/atomic-long.h:1506 ./include/linux/atomic/atomic-instrumented.h:4481 kernel/locking/mutex.c:181 kernel/locking/mutex.c:545) 
> [ 100.205107][ T8134] ? __pfx_filldir64 (fs/readdir.c:352) 
> [ 100.206145][ T8134] ? fpregs_assert_state_consistent (arch/x86/kernel/fpu/context.h:38 arch/x86/kernel/fpu/core.c:822) 
> [ 100.207628][ T8134] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) 
> [ 100.208698][ T8134] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) 
> [  100.210104][ T8134] RIP: 0033:0x7fd5a43b473d
> [ 100.211167][ T8134] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 78
> All code
> ========
>   0: 00 c3                 add    %al,%bl
>   2: 66 2e 0f 1f 84 00 00 cs nopw 0x0(%rax,%rax,1)
>   9: 00 00 00 
>   c: 90                    nop
>   d: f3 0f 1e fa           endbr64 
>  11: 48 89 f8              mov    %rdi,%rax
>  14: 48 89 f7              mov    %rsi,%rdi
>  17: 48 89 d6              mov    %rdx,%rsi
>  1a: 48 89 ca              mov    %rcx,%rdx
>  1d: 4d 89 c2              mov    %r8,%r10
>  20: 4d 89 c8              mov    %r9,%r8
>  23: 4c 8b 4c 24 08        mov    0x8(%rsp),%r9
>  28: 0f 05                 syscall 
>  2a:* 48 3d 01 f0 ff ff     cmp    $0xfffffffffffff001,%rax <-- trapping instruction
>  30: 78                    .byte 0x78
> 
> Code starting with the faulting instruction
> ===========================================
>   0: 48 3d 01 f0 ff ff     cmp    $0xfffffffffffff001,%rax
>   6: 78                    .byte 0x78
> [  100.216055][ T8134] RSP: 002b:00007ffc8e81ca28 EFLAGS: 00000203 ORIG_RAX: 00000000000000d9
> [  100.218175][ T8134] RAX: ffffffffffffffda RBX: 00005616907c2360 RCX: 00007fd5a43b473d
> [  100.220331][ T8134] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004
> [  100.222587][ T8134] RBP: 00007ffc8e81ca40 R08: 00007ffc8e81cb30 R09: 00007ffc8e81cb30
> [  100.224629][ T8134] R10: 00007ffc8e81cb30 R11: 0000000000000203 R12: 00005616907c03c0
> [  100.226728][ T8134] R13: 00007ffc8e81cb30 R14: 0000000000000000 R15: 0000000000000000
> [  100.228901][ T8134]  </TASK>
> [  100.230006][ T8134] Kernel Offset: disabled
> 
> <.config><repro.c>
> 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ