lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20251015141445.969-1-adrianhuang0701@gmail.com>
Date: Wed, 15 Oct 2025 22:14:45 +0800
From: "Adrian Huang (Lenovo)" <adrianhuang0701@...il.com>
To: Steven Rostedt <rostedt@...dmis.org>,
	Gabriele Monaco <gmonaco@...hat.com>
Cc: Masami Hiramatsu <mhiramat@...nel.org>,
	athieu Desnoyers <mathieu.desnoyers@...icios.com>,
	Nam Cao <namcao@...utronix.de>,
	linux-trace-kernel@...r.kernel.org,
	linux-kernel@...r.kernel.org,
	ahuang12@...ovo.com,
	"Adrian Huang (Lenovo)" <adrianhuang0701@...il.com>
Subject: [PATCH 1/1] rv: Fix the invalid address access when reading enabled_monitors

When executing the following command (reproducible 100%), a kernel oops
occurs:

  # cat /sys/kernel/debug/tracing/rv/enabled_monitors

  [dmesg]
  BUG: unable to handle page fault for address: ffffffffffffffd0
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 3ddf828067 P4D 3ddf829067 PUD 3ddf82b067 PMD 0
  Oops: Oops: 0000 [#1] SMP NOPTI
  CPU: 479 UID: 0 PID: 15237 Comm: cat Kdump: loaded Not tainted 6.18.0-rc1 #25 PREEMPT(voluntary)
  Hardware name: Lenovo ThinkSystem SR645 V3 MB,Genoa,DDR5,Oahu,1U/SB27B31174, BIOS KAE139B-5.70 06/11/2025
  RIP: 0010:enabled_monitors_next+0x41/0x60
  Code: c0 66 a6 bb 75 24 eb 2d 66 66 2e 0f 1f 84 00 00 00 00 00 66 0f 1f 44 00 00 48 8b 50 40 48 8d 42 c0 48 81 fa c0 66 a6 bb 74 0b <80> 78 10 00 74 e9 c3 cc cc cc cc 31 c0 c3 cc cc cc cc 66 66 2e 0f
  RSP: 0018:ff565a8b1e653d38 EFLAGS: 00010203
  RAX: ffffffffffffffc0 RBX: ff41e057260eabb8 RCX: 0000000000000001
  RDX: 0000000000000000 RSI: ffffffffbba66640 RDI: ff41e057260eabb8
  RBP: 0000000000000000 R08: ffffffffbb313406 R09: 0000000000000034
  R10: 0000000000000000 R11: 0000000000000004 R12: ff565a8b1e653dd0
  R13: ff565a8b1e653da8 R14: ffffffffbba66640 R15: 0000000000000000
  FS:  00007f8da78a4740(0000) GS:ff41e076cde6e000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: ffffffffffffffd0 CR3: 00000001b6b26005 CR4: 0000000000f71ef0
  PKRU: 55555554
  Call Trace:
   <TASK>
   seq_read_iter+0x2ed/0x480
   seq_read+0x12e/0x160
   vfs_read+0xc1/0x370
   ? count_memcg_events+0xb6/0x170
   ksys_read+0x6b/0xe0
   do_syscall_64+0x89/0x810
   entry_SYSCALL_64_after_hwframe+0x76/0x7e
  RIP: 0033:0x7f8da79a0321

[Root Cause]
enabled_monitors_start() calls enabled_monitors_next() and passes the
address of a struct rv_monitor instead of the address of its embedded
list_head.

Commit de090d1ccae1 ("rv: Fix wrong type cast in enabled_monitors_next()")
assumes that the argument p refers to a list_head (the embedded list
anchor). This leads to the miscalculated address for the corresponding
struct rv_monitor object.

Here’s what happens in detail:

  1. Address of rv_monitors_list = 0xffffffffbba666c0
     crash> p &rv_monitors_list
     $1 = (struct list_head *) 0xffffffffbba666c0 <rv_monitors_list>

  2. offset of rv_monitor.list = 0x40
     crash> rv_monitor.list -x
     struct rv_monitor {
       [0x40] struct list_head list;
     }

  3. In enabled_monitors_start(): The local variable mon is assigned
     using list_entry(), resulting in:
         mon = &rv_monitors_list - 0x40 = 0xffffffffbba66680

  4. In enabled_monitors_next(): The argument p becomes
     &rv_monitors_list - 0x40. However, container_of() subtracts the
     offset of rv_monitor.list again, making mon equal to
     &rv_monitors_list - 0x80. This double subtraction results in an
     invalid address and triggers the page fault.

Fix the issue by returning the address of the list_head from both
enabled_monitors_start() and enabled_monitors_next() instead of the
address of struct rv_monitor.

The following verifications make sure the issue is fixed:
1. Without enabling any monitors
   # cat /sys/kernel/debug/tracing/rv/enabled_monitors
   <No output; no kernel oops.>

2. Enable monitor and reading enabled_monitors: Test #1
   # echo 1 > /sys/kernel/debug/tracing/rv/monitors/wwnr/enable
   # echo 1 > /sys/kernel/debug/tracing/rv/monitors/rtapp/sleep/enable
   # cat /sys/kernel/debug/tracing/rv/enabled_monitors
   wwnr
   rtapp:sleep

3. Enable monitor and reading enabled_monitors: Test #2
   # echo 0 > /sys/kernel/debug/tracing/rv/monitors/wwnr/enable
   # echo 1 > /sys/kernel/debug/tracing/rv/monitors/rtapp/sleep/enable
   # echo 1 > /sys/kernel/debug/tracing/rv/monitors/rtapp/pagefault/enable
   # echo 1 > /sys/kernel/debug/tracing/rv/monitors/rtapp/enable 
   # cat /sys/kernel/debug/tracing/rv/enabled_monitors
   rtapp
   rtapp:sleep
   rtapp:pagefault
   
Fixes: de090d1ccae1 ("rv: Fix wrong type cast in enabled_monitors_next()")
Signed-off-by: Adrian Huang (Lenovo) <adrianhuang0701@...il.com>
---
 kernel/trace/rv/rv.c | 14 ++++++--------
 1 file changed, 6 insertions(+), 8 deletions(-)

diff --git a/kernel/trace/rv/rv.c b/kernel/trace/rv/rv.c
index 48338520376f..021cc9bc57ab 100644
--- a/kernel/trace/rv/rv.c
+++ b/kernel/trace/rv/rv.c
@@ -501,7 +501,7 @@ static void *enabled_monitors_next(struct seq_file *m, void *p, loff_t *pos)
 
 	list_for_each_entry_continue(mon, &rv_monitors_list, list) {
 		if (mon->enabled)
-			return mon;
+			return &mon->list;
 	}
 
 	return NULL;
@@ -509,23 +509,21 @@ static void *enabled_monitors_next(struct seq_file *m, void *p, loff_t *pos)
 
 static void *enabled_monitors_start(struct seq_file *m, loff_t *pos)
 {
-	struct rv_monitor *mon;
+	struct list_head *lh = &rv_monitors_list;
 	loff_t l;
 
 	mutex_lock(&rv_interface_lock);
 
-	if (list_empty(&rv_monitors_list))
+	if (list_empty(lh))
 		return NULL;
 
-	mon = list_entry(&rv_monitors_list, struct rv_monitor, list);
-
 	for (l = 0; l <= *pos; ) {
-		mon = enabled_monitors_next(m, mon, &l);
-		if (!mon)
+		lh = enabled_monitors_next(m, lh, &l);
+		if (!lh)
 			break;
 	}
 
-	return mon;
+	return lh;
 }
 
 /*
-- 
2.43.0


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ