lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20241223141135.g5lkpzhz32pcpzku@jpoimboe>
Date: Mon, 23 Dec 2024 06:11:35 -0800
From: Josh Poimboeuf <jpoimboe@...nel.org>
To: wzs <wangzhengshu39@...il.com>
Cc: Peter Zijlstra <peterz@...radead.org>,
	Naresh Kamboju <naresh.kamboju@...aro.org>,
	linux-kernel@...r.kernel.org, linux-snps-arc@...ts.infradead.org,
	linux-arm-kernel@...ts.infradead.org, loongarch@...ts.linux.dev,
	linux-parisc@...r.kernel.org, x86@...nel.org
Subject: Re: WARNING: kernel stack regs has bad "bp" value

On Mon, Dec 23, 2024 at 11:34:58AM +0800, wzs wrote:
> Hello,
> when fuzzing the Linux Kernel,
> i encountered several rare kernel warnings.
> It seems that the warning is related to the kernel stack.
> The versions in which this appeared are from Linux-6.8.0 to 6.13-rc3.
> 
> The two warning messages I provide below are both from the latest
> kernel version, Linux-6.13-rc3.
> If you need warnings from other versions, I would be happy to provide
> them as well.
> 
> kernel config :https://pastebin.com/hGFvz9vz
> console output1 :https://pastebin.com/7vBkDAvK
> console output2 : https://pastebin.com/T8h3Hnrr

I assume you booted with unwind_debug on the cmdline?  This "warning" is
harmless, in fact it's not a real WARNING, it's only a stack dump which
is useful for debugging stack tracing issues.

Can you share the dissassembly of vmw_send_msg? e.g. something like

  objdump -r --disassemble=vmw_send_msg vmwgfx.ko

-- 
Josh

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ