2018-10-22 14:43:57 |
Igor Chorazewicz |
bug |
|
|
added bug |
2018-10-22 15:41:30 |
Igor Chorazewicz |
description |
I have a file located on ext4 mounted with "dax". When I call mmap on that file with protection flag different than PROT_NONE
and pass the returned address to mprotect(..., PROT_NONE) it fails with:
mprotect: Permission denied
This bug affects PMDK (https://github.com/pmem/pmdk) and seems to be Ubuntu kernel-specific.
Problem was observer on kernel 4.15.0-36-generic and 4.15.0-34-generic
Below is a code which can be used to reproduce the issue.
#include <sys/stat.h>
#include <sys/types.h>
#include <sys/mman.h>
#include <stdlib.h>
#include <stdio.h>
#include <fcntl.h>
int main(int argc, char *argv[])
{
if (argc < 3) {
fprintf(stderr, "usage %s file size\n", argv[0]);
return 1;
}
int size = atoi(argv[2]);
int fd = open(argv[1], O_RDWR);
if (fd < 0) {
perror("open");
return 1;
}
void *addr = mmap(NULL, size, PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0);
if (addr == MAP_FAILED) {
perror("mmap");
return 1;
}
if(mprotect(addr, size, PROT_NONE)) {
perror("mprotect");
return 1;
}
return 0;
} |
I have a file located on ext4 mounted with "dax". When I call mmap on that file with protection flag different than PROT_NONE and pass the returned address to mprotect(..., PROT_NONE) it fails with:
mprotect: Permission denied
This bug affects PMDK (https://github.com/pmem/pmdk) and seems to be Ubuntu kernel-specific.
Problem was observer on kernel 4.15.0-36-generic and 4.15.0-34-generic
Below is a code which can be used to reproduce the issue.
#include <sys/stat.h>
#include <sys/types.h>
#include <sys/mman.h>
#include <stdlib.h>
#include <stdio.h>
#include <fcntl.h>
int main(int argc, char *argv[])
{
if (argc < 3) {
fprintf(stderr, "usage %s file size\n", argv[0]);
return 1;
}
int size = atoi(argv[2]);
int fd = open(argv[1], O_RDWR);
if (fd < 0) {
perror("open");
return 1;
}
void *addr = mmap(NULL, size, PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0);
if (addr == MAP_FAILED) {
perror("mmap");
return 1;
}
if(mprotect(addr, size, PROT_NONE)) {
perror("mprotect");
return 1;
}
return 0;
} |
|
2018-10-22 16:47:15 |
Igor Chorazewicz |
bug |
|
|
added subscriber Marcin Ślusarz |
2018-10-22 16:49:11 |
Marcin Ślusarz |
bug |
|
|
added subscriber Andreas Hasenack |
2018-10-22 20:10:40 |
Andreas Hasenack |
bug task added |
|
linux (Ubuntu) |
|
2018-10-22 20:30:06 |
Ubuntu Kernel Bot |
linux (Ubuntu): status |
New |
Incomplete |
|
2018-10-22 20:30:07 |
Ubuntu Kernel Bot |
tags |
|
bionic |
|
2018-10-23 18:52:29 |
Igor Chorazewicz |
tags |
bionic |
apport-collected bionic |
|
2018-10-23 18:52:30 |
Igor Chorazewicz |
description |
I have a file located on ext4 mounted with "dax". When I call mmap on that file with protection flag different than PROT_NONE and pass the returned address to mprotect(..., PROT_NONE) it fails with:
mprotect: Permission denied
This bug affects PMDK (https://github.com/pmem/pmdk) and seems to be Ubuntu kernel-specific.
Problem was observer on kernel 4.15.0-36-generic and 4.15.0-34-generic
Below is a code which can be used to reproduce the issue.
#include <sys/stat.h>
#include <sys/types.h>
#include <sys/mman.h>
#include <stdlib.h>
#include <stdio.h>
#include <fcntl.h>
int main(int argc, char *argv[])
{
if (argc < 3) {
fprintf(stderr, "usage %s file size\n", argv[0]);
return 1;
}
int size = atoi(argv[2]);
int fd = open(argv[1], O_RDWR);
if (fd < 0) {
perror("open");
return 1;
}
void *addr = mmap(NULL, size, PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0);
if (addr == MAP_FAILED) {
perror("mmap");
return 1;
}
if(mprotect(addr, size, PROT_NONE)) {
perror("mprotect");
return 1;
}
return 0;
} |
I have a file located on ext4 mounted with "dax". When I call mmap on that file with protection flag different than PROT_NONE and pass the returned address to mprotect(..., PROT_NONE) it fails with:
mprotect: Permission denied
This bug affects PMDK (https://github.com/pmem/pmdk) and seems to be Ubuntu kernel-specific.
Problem was observer on kernel 4.15.0-36-generic and 4.15.0-34-generic
Below is a code which can be used to reproduce the issue.
#include <sys/stat.h>
#include <sys/types.h>
#include <sys/mman.h>
#include <stdlib.h>
#include <stdio.h>
#include <fcntl.h>
int main(int argc, char *argv[])
{
if (argc < 3) {
fprintf(stderr, "usage %s file size\n", argv[0]);
return 1;
}
int size = atoi(argv[2]);
int fd = open(argv[1], O_RDWR);
if (fd < 0) {
perror("open");
return 1;
}
void *addr = mmap(NULL, size, PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0);
if (addr == MAP_FAILED) {
perror("mmap");
return 1;
}
if(mprotect(addr, size, PROT_NONE)) {
perror("mprotect");
return 1;
}
return 0;
}
---
ProblemType: Bug
ApportVersion: 2.20.9-0ubuntu7.4
Architecture: amd64
AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', '/dev/snd/timer'] failed with exit code 1:
CRDA: Error: command ['iw', 'reg', 'get'] failed with exit code 1: nl80211 not found.
CurrentDesktop: ubuntu:GNOME
DistroRelease: Ubuntu 18.04
InstallationDate: Installed on 2018-10-23 (0 days ago)
InstallationMedia: Ubuntu 18.04.1 LTS "Bionic Beaver" - Release amd64 (20180725)
IwConfig:
lo no wireless extensions.
enp0s3 no wireless extensions.
Lsusb:
Bus 001 Device 002: ID 80ee:0021 VirtualBox USB Tablet
Bus 001 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
MachineType: innotek GmbH VirtualBox
Package: linux (not installed)
ProcFB:
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.15.0-36-generic root=UUID=48e87c4c-3028-4252-b7bb-e1e6091ff7f6 ro quiet splash
ProcVersionSignature: Ubuntu 4.15.0-36.39-generic 4.15.18
RelatedPackageVersions:
linux-restricted-modules-4.15.0-36-generic N/A
linux-backports-modules-4.15.0-36-generic N/A
linux-firmware 1.173.1
RfKill:
Tags: bionic
Uname: Linux 4.15.0-36-generic x86_64
UpgradeStatus: No upgrade log present (probably fresh install)
UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
_MarkForUpload: True
dmi.bios.date: 12/01/2006
dmi.bios.vendor: innotek GmbH
dmi.bios.version: VirtualBox
dmi.board.name: VirtualBox
dmi.board.vendor: Oracle Corporation
dmi.board.version: 1.2
dmi.chassis.type: 1
dmi.chassis.vendor: Oracle Corporation
dmi.modalias: dmi:bvninnotekGmbH:bvrVirtualBox:bd12/01/2006:svninnotekGmbH:pnVirtualBox:pvr1.2:rvnOracleCorporation:rnVirtualBox:rvr1.2:cvnOracleCorporation:ct1:cvr:
dmi.product.family: Virtual Machine
dmi.product.name: VirtualBox
dmi.product.version: 1.2
dmi.sys.vendor: innotek GmbH |
|
2018-10-23 18:52:31 |
Igor Chorazewicz |
attachment added |
|
AlsaInfo.txt https://bugs.launchpad.net/bugs/1799237/+attachment/5204640/+files/AlsaInfo.txt |
|
2018-10-23 18:52:32 |
Igor Chorazewicz |
attachment added |
|
CurrentDmesg.txt https://bugs.launchpad.net/bugs/1799237/+attachment/5204641/+files/CurrentDmesg.txt |
|
2018-10-23 18:52:33 |
Igor Chorazewicz |
attachment added |
|
Lspci.txt https://bugs.launchpad.net/bugs/1799237/+attachment/5204642/+files/Lspci.txt |
|
2018-10-23 18:52:34 |
Igor Chorazewicz |
attachment added |
|
ProcCpuinfo.txt https://bugs.launchpad.net/bugs/1799237/+attachment/5204643/+files/ProcCpuinfo.txt |
|
2018-10-23 18:52:36 |
Igor Chorazewicz |
attachment added |
|
ProcCpuinfoMinimal.txt https://bugs.launchpad.net/bugs/1799237/+attachment/5204644/+files/ProcCpuinfoMinimal.txt |
|
2018-10-23 18:52:37 |
Igor Chorazewicz |
attachment added |
|
ProcEnviron.txt https://bugs.launchpad.net/bugs/1799237/+attachment/5204645/+files/ProcEnviron.txt |
|
2018-10-23 18:52:38 |
Igor Chorazewicz |
attachment added |
|
ProcInterrupts.txt https://bugs.launchpad.net/bugs/1799237/+attachment/5204646/+files/ProcInterrupts.txt |
|
2018-10-23 18:52:39 |
Igor Chorazewicz |
attachment added |
|
ProcModules.txt https://bugs.launchpad.net/bugs/1799237/+attachment/5204647/+files/ProcModules.txt |
|
2018-10-23 18:52:40 |
Igor Chorazewicz |
attachment added |
|
PulseList.txt https://bugs.launchpad.net/bugs/1799237/+attachment/5204648/+files/PulseList.txt |
|
2018-10-23 18:52:41 |
Igor Chorazewicz |
attachment added |
|
UdevDb.txt https://bugs.launchpad.net/bugs/1799237/+attachment/5204649/+files/UdevDb.txt |
|
2018-10-23 18:52:42 |
Igor Chorazewicz |
attachment added |
|
WifiSyslog.txt https://bugs.launchpad.net/bugs/1799237/+attachment/5204650/+files/WifiSyslog.txt |
|
2018-10-23 18:54:18 |
Igor Chorazewicz |
linux (Ubuntu): status |
Incomplete |
Confirmed |
|
2018-10-24 10:13:23 |
Launchpad Janitor |
ubuntu: status |
New |
Confirmed |
|
2018-10-24 15:14:12 |
Marcin Ślusarz |
bug task added |
|
pmdk (Ubuntu) |
|
2018-10-24 16:07:20 |
dawid |
description |
I have a file located on ext4 mounted with "dax". When I call mmap on that file with protection flag different than PROT_NONE and pass the returned address to mprotect(..., PROT_NONE) it fails with:
mprotect: Permission denied
This bug affects PMDK (https://github.com/pmem/pmdk) and seems to be Ubuntu kernel-specific.
Problem was observer on kernel 4.15.0-36-generic and 4.15.0-34-generic
Below is a code which can be used to reproduce the issue.
#include <sys/stat.h>
#include <sys/types.h>
#include <sys/mman.h>
#include <stdlib.h>
#include <stdio.h>
#include <fcntl.h>
int main(int argc, char *argv[])
{
if (argc < 3) {
fprintf(stderr, "usage %s file size\n", argv[0]);
return 1;
}
int size = atoi(argv[2]);
int fd = open(argv[1], O_RDWR);
if (fd < 0) {
perror("open");
return 1;
}
void *addr = mmap(NULL, size, PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0);
if (addr == MAP_FAILED) {
perror("mmap");
return 1;
}
if(mprotect(addr, size, PROT_NONE)) {
perror("mprotect");
return 1;
}
return 0;
}
---
ProblemType: Bug
ApportVersion: 2.20.9-0ubuntu7.4
Architecture: amd64
AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', '/dev/snd/timer'] failed with exit code 1:
CRDA: Error: command ['iw', 'reg', 'get'] failed with exit code 1: nl80211 not found.
CurrentDesktop: ubuntu:GNOME
DistroRelease: Ubuntu 18.04
InstallationDate: Installed on 2018-10-23 (0 days ago)
InstallationMedia: Ubuntu 18.04.1 LTS "Bionic Beaver" - Release amd64 (20180725)
IwConfig:
lo no wireless extensions.
enp0s3 no wireless extensions.
Lsusb:
Bus 001 Device 002: ID 80ee:0021 VirtualBox USB Tablet
Bus 001 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
MachineType: innotek GmbH VirtualBox
Package: linux (not installed)
ProcFB:
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.15.0-36-generic root=UUID=48e87c4c-3028-4252-b7bb-e1e6091ff7f6 ro quiet splash
ProcVersionSignature: Ubuntu 4.15.0-36.39-generic 4.15.18
RelatedPackageVersions:
linux-restricted-modules-4.15.0-36-generic N/A
linux-backports-modules-4.15.0-36-generic N/A
linux-firmware 1.173.1
RfKill:
Tags: bionic
Uname: Linux 4.15.0-36-generic x86_64
UpgradeStatus: No upgrade log present (probably fresh install)
UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
_MarkForUpload: True
dmi.bios.date: 12/01/2006
dmi.bios.vendor: innotek GmbH
dmi.bios.version: VirtualBox
dmi.board.name: VirtualBox
dmi.board.vendor: Oracle Corporation
dmi.board.version: 1.2
dmi.chassis.type: 1
dmi.chassis.vendor: Oracle Corporation
dmi.modalias: dmi:bvninnotekGmbH:bvrVirtualBox:bd12/01/2006:svninnotekGmbH:pnVirtualBox:pvr1.2:rvnOracleCorporation:rnVirtualBox:rvr1.2:cvnOracleCorporation:ct1:cvr:
dmi.product.family: Virtual Machine
dmi.product.name: VirtualBox
dmi.product.version: 1.2
dmi.sys.vendor: innotek GmbH |
I have a file located on ext4 mounted with "dax". When I call mmap on that file with protection flag different than PROT_NONE and pass the returned address to mprotect(..., PROT_NONE) it fails with:
mprotect: Permission denied
This bug affects PMDK (https://github.com/pmem/pmdk) and seems to be Ubuntu kernel-specific.
Problem was observer on kernel 4.15.0-36-generic and 4.15.0-34-generic
Below is a code which can be used to reproduce the issue.
#include <sys/stat.h>
#include <sys/types.h>
#include <sys/mman.h>
#include <stdlib.h>
#include <stdio.h>
#include <fcntl.h>
int main(int argc, char *argv[])
{
if (argc < 3) {
fprintf(stderr, "usage %s file size\n", argv[0]);
return 1;
}
int size = atoi(argv[2]);
int fd = open(argv[1], O_RDWR);
if (fd < 0) {
perror("open");
return 1;
}
void *addr = mmap(NULL, size, PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0);
if (addr == MAP_FAILED) {
perror("mmap");
return 1;
}
if(mprotect(addr, size, PROT_NONE)) {
perror("mprotect");
return 1;
}
return 0;
}
---
ProblemType: Bug
ApportVersion: 2.20.9-0ubuntu7.4
Architecture: amd64
AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', '/dev/snd/timer'] failed with exit code 1:
CRDA: Error: command ['iw', 'reg', 'get'] failed with exit code 1: nl80211 not found.
CurrentDesktop: ubuntu:GNOME
DistroRelease: Ubuntu 18.04
InstallationDate: Installed on 2018-10-23 (0 days ago)
InstallationMedia: Ubuntu 18.04.1 LTS "Bionic Beaver" - Release amd64 (20180725)
IwConfig:
lo no wireless extensions.
enp0s3 no wireless extensions.
Lsusb:
Bus 001 Device 002: ID 80ee:0021 VirtualBox USB Tablet
Bus 001 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
MachineType: innotek GmbH VirtualBox
Package: linux (not installed)
ProcFB:
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.15.0-36-generic root=UUID=48e87c4c-3028-4252-b7bb-e1e6091ff7f6 ro quiet splash
ProcVersionSignature: Ubuntu 4.15.0-36.39-generic 4.15.18
RelatedPackageVersions:
linux-restricted-modules-4.15.0-36-generic N/A
linux-backports-modules-4.15.0-36-generic N/A
linux-firmware 1.173.1
RfKill:
Tags: bionic
Uname: Linux 4.15.0-36-generic x86_64
UpgradeStatus: No upgrade log present (probably fresh install)
UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
_MarkForUpload: True
dmi.bios.date: 12/01/2006
dmi.bios.vendor: innotek GmbH
dmi.bios.version: VirtualBox
dmi.board.name: VirtualBox
dmi.board.vendor: Oracle Corporation
dmi.board.version: 1.2
dmi.chassis.type: 1
dmi.chassis.vendor: Oracle Corporation
dmi.modalias: dmi:bvninnotekGmbH:bvrVirtualBox:bd12/01/2006:svninnotekGmbH:pnVirtualBox:pvr1.2:rvnOracleCorporation:rnVirtualBox:rvr1.2:cvnOracleCorporation:ct1:cvr:
dmi.product.family: Virtual Machine
dmi.product.name: VirtualBox
dmi.product.version: 1.2
dmi.sys.vendor: innotek GmbH |
|
2018-10-24 16:08:48 |
Launchpad Janitor |
pmdk (Ubuntu): status |
New |
Confirmed |
|
2018-10-25 13:17:55 |
Robie Basak |
pmdk (Ubuntu): status |
Confirmed |
Invalid |
|
2018-10-25 13:18:01 |
Robie Basak |
ubuntu: status |
Confirmed |
Invalid |
|
2018-10-25 13:57:46 |
Joseph Salisbury |
linux (Ubuntu): importance |
Undecided |
High |
|
2018-10-25 13:57:57 |
Joseph Salisbury |
nominated for series |
|
Ubuntu Bionic |
|
2018-10-25 13:57:57 |
Joseph Salisbury |
bug task added |
|
linux (Ubuntu Bionic) |
|
2018-10-25 13:57:57 |
Joseph Salisbury |
bug task added |
|
pmdk (Ubuntu Bionic) |
|
2018-10-25 13:57:57 |
Joseph Salisbury |
bug task added |
|
Ubuntu Bionic |
|
2018-10-25 13:58:06 |
Joseph Salisbury |
bug task deleted |
pmdk (Ubuntu Bionic) |
|
|
2018-10-25 13:58:12 |
Joseph Salisbury |
bug task deleted |
Ubuntu Bionic |
|
|
2018-10-25 13:58:15 |
Joseph Salisbury |
linux (Ubuntu Bionic): status |
New |
Confirmed |
|
2018-10-25 13:58:19 |
Joseph Salisbury |
linux (Ubuntu Bionic): importance |
Undecided |
High |
|
2018-10-25 13:59:58 |
Joseph Salisbury |
linux (Ubuntu): assignee |
|
Joseph Salisbury (jsalisbury) |
|
2018-10-25 14:00:01 |
Joseph Salisbury |
linux (Ubuntu Bionic): assignee |
|
Joseph Salisbury (jsalisbury) |
|
2019-01-21 16:56:56 |
Joseph Salisbury |
linux (Ubuntu): assignee |
Joseph Salisbury (jsalisbury) |
|
|
2019-01-21 16:56:58 |
Joseph Salisbury |
linux (Ubuntu Bionic): assignee |
Joseph Salisbury (jsalisbury) |
|
|
2019-01-30 21:37:19 |
Joshua Powers |
bug |
|
|
added subscriber Joshua Powers |
2019-02-05 09:48:16 |
Kleber Sacilotto de Souza |
linux (Ubuntu): status |
Confirmed |
Invalid |
|
2019-02-05 09:56:15 |
Kleber Sacilotto de Souza |
linux (Ubuntu Bionic): status |
Confirmed |
Fix Committed |
|
2019-02-15 14:42:42 |
Brad Figg |
tags |
apport-collected bionic |
apport-collected bionic verification-needed-bionic |
|
2019-02-17 13:48:58 |
Christian Priebe |
tags |
apport-collected bionic verification-needed-bionic |
apport-collected bionic verification-done-bionic |
|
2019-03-05 15:00:44 |
Launchpad Janitor |
linux (Ubuntu Bionic): status |
Fix Committed |
Fix Released |
|
2019-03-05 15:00:44 |
Launchpad Janitor |
cve linked |
|
2018-18397 |
|
2019-03-05 15:00:44 |
Launchpad Janitor |
cve linked |
|
2018-19854 |
|
2019-03-05 15:00:44 |
Launchpad Janitor |
cve linked |
|
2019-6133 |
|
2019-07-24 20:56:41 |
Brad Figg |
tags |
apport-collected bionic verification-done-bionic |
apport-collected bionic cscc verification-done-bionic |
|