lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 07 Jun 2012 02:41:59 +0200
From:	Sasha Levin <levinsasha928@...il.com>
To:	tyhicks <tyhicks@...onical.com>
Cc:	"dustin.kirkland" <dustin.kirkland@...zang.com>,
	ecryptfs <ecryptfs@...r.kernel.org>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: Re: ecryptfs: kernel BUG at fs/ecryptfs/miscdev.c:52

On Sat, 2012-05-26 at 21:39 +0200, Sasha Levin wrote:
> Hi all,
> 
> During fuzzing with trinity inside a KVM guest, using latest linux-next kernel, I've stumbled on the following:
> 
> [  175.995560] ------------[ cut here ]------------
> [  175.996026] kernel BUG at fs/ecryptfs/miscdev.c:52!
> [  175.996026] invalid opcode: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC
> [  175.996026] CPU 3 
> [  175.996026] Pid: 7903, comm: trinity-child3 Tainted: G        W    3.4.0-next-20120524-sasha #296 Bochs Bochs
> [  175.996026] RIP: 0010:[<ffffffff813e945a>]  [<ffffffff813e945a>] ecryptfs_miscdev_poll+0x5a/0x150
> [  175.996026] RSP: 0018:ffff88002d4a3aa8  EFLAGS: 00010282
> [  175.996026] RAX: 00000000ffffffea RBX: ffff88002d4a3b98 RCX: ffff880019d3c348
> [  175.996026] RDX: ffffffff84444140 RSI: 000000000b32e681 RDI: ffff88002d4a3ab0
> [  175.996026] RBP: ffff88002d4a3ad8 R08: cbf7d334712ee681 R09: 0200000000000000
> [  175.996026] R10: 2000000000000000 R11: 3408000000000000 R12: ffff88003d53c000
> [  176.022035] R13: 000000000b32e681 R14: ffff88002d4b059c R15: ffff88003d53c000
> 165983 iteration[  176.026020] FS:  00007f0abac73700(0000) GS:ffff880035a00000(0000) knlGS:0000000000000000
> [  176.026020] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> s.
> [  176.026020] CR2: 00000000011750d8 CR3: 0000000039722000 CR4: 00000000000407e0
> [  176.026020] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> [  176.026020] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> [  176.026020] Process trinity-child3 (pid: 7903, threadinfo ffff88002d4a2000, task ffff88002d503000)
> [  176.026020] Stack:
> [  176.026020]  ffff88002d4b069c ffff880019d3c348 ffff88002d4b069c ffff88002d4b069c
> [  176.026020]  ffff88002d4a3b44 ffff88002d4a3b98 ffff88002d4a3b78 ffffffff8124d9bc
> [  176.026020]  ffff88002d503000 ffff88002d503000 01ffffff811f5afe 0000000000000000
> [  176.026020] Call Trace:
> [  176.026020]  [<ffffffff8124d9bc>] do_poll+0x11c/0x2b0
> [  176.026020]  [<ffffffff8124dcbf>] do_sys_poll+0x16f/0x240
> [  176.026020]  [<ffffffff8114dfdd>] ? __lock_acquired+0x3d/0x2e0
> [  176.026020]  [<ffffffff811fade6>] ? do_wp_page+0x5c6/0x800
> [  176.026020]  [<ffffffff811faf73>] ? do_wp_page+0x753/0x800
> 197143 iteration[  176.026020]  [<ffffffff8197e060>] ? do_raw_spin_unlock+0xd0/0xe0
> s.
> [  176.026020]  [<ffffffff83249080>] ? _raw_spin_unlock+0x30/0x60
> [  176.026020]  [<ffffffff811fafe8>] ? do_wp_page+0x7c8/0x800
> [  176.026020]  [<ffffffff8114dfdd>] ? __lock_acquired+0x3d/0x2e0
> [  176.026020]  [<ffffffff8198044d>] ? debug_object_activate+0x6d/0x1b0
> [  176.026020]  [<ffffffff81980532>] ? debug_object_activate+0x152/0x1b0
> [  176.026020]  [<ffffffff8197e060>] ? do_raw_spin_unlock+0xd0/0xe0
> [  176.026020]  [<ffffffff8114b4cd>] ? trace_hardirqs_off+0xd/0x10
> [  176.026020]  [<ffffffff83249144>] ? _raw_spin_unlock_irqrestore+0x94/0xc0
> [  176.026020]  [<ffffffff81980532>] ? debug_object_activate+0x152/0x1b0
> [  176.026020]  [<ffffffff819611ee>] ? rb_insert_color+0x9e/0x160
> [  176.026020]  [<ffffffff8110c488>] ? __hrtimer_start_range_ns+0x448/0x490
> [  176.026020]  [<ffffffff8197e060>] ? do_raw_spin_unlock+0xd0/0xe0
> [  176.026020]  [<ffffffff8124df6c>] sys_poll+0x6c/0x100
> [  176.026020]  [<ffffffff8324a1f9>] system_call_fastpath+0x16/0x1b
> [  176.026020] Code: 00 00 44 8b 68 24 e8 66 cc e5 01 48 8d 7d d8 48 c7 c2 40 41 44 84 44 89 ee e8 a3 ef ff ff 85 c0 75 09 48 8b 7d 
> d8 48 85 ff 75 0e <0f> 0b 0f 1f 40 00 eb fe 66 0f 1f 44 00 00 48 83 c7 28 31 f6 e8 
> [  176.026020] RIP  [<ffffffff813e945a>] ecryptfs_miscdev_poll+0x5a/0x150
> [  176.026020]  RSP <ffff88002d4a3aa8>
> [  176.028658] ---[ end trace 8f6ca168297608bd ]---
> 

I'm also seeing this, which is probably related:

[  269.149993] ------------[ cut here ]------------
[  269.150735] kernel BUG at fs/ecryptfs/miscdev.c:272!
[  269.150735] invalid opcode: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC
[  269.150735] CPU 0 
[  269.150735] Pid: 8059, comm: trinity-child0 Tainted: G        W    3.5.0-rc1-next-20120605-sasha-00012-g1389a60 #355  
[  269.150735] RIP: 0010:[<ffffffff813eb711>]  [<ffffffff813eb711>] ecryptfs_miscdev_read+0x61/0x470
[  269.150735] RSP: 0018:ffff88000baf3e58  EFLAGS: 00010282
[  269.150735] RAX: 00000000ffffffea RBX: 00000000ffffffea RCX: ffff880028d9c620
[  269.150735] RDX: ffffffff84a4d140 RSI: 000000007184449d RDI: ffff88000baf3eb0
[  269.150735] RBP: ffff88000baf3ef8 R08: db1639ef5f10449d R09: 3a00000000000000
[  269.150735] R10: a000000000000000 R11: 24e8000000000000 R12: ffff88000bb1b000
[  269.150735] R13: 0000000000f59af0 R14: 0000000000000000 R15: 000000007184449d
[  269.150735] FS:  00007fa2c283e700(0000) GS:ffff88000d800000(0000) knlGS:0000000000000000
[  269.150735] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  269.150735] CR2: 00000000012d0098 CR3: 000000003349e000 CR4: 00000000000406f0
[  269.150735] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  269.150735] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[  269.150735] Process trinity-child0 (pid: 8059, threadinfo ffff88000baf2000, task ffff88000bb1b000)
[  269.150735] Stack:
[  269.150735]  0000000000000000 0000000000000000 ffff88000bb1b000 0000000000020000
[  269.150735]  ffff880019fbac10 ffff88001adeabe8 0000000000000004 0000000000000191
[  269.150735]  ffff88000baf3ec8 ffffffff818ae971 0000000000000000 ffff880019fbac00
[  269.150735] Call Trace:
[  269.150735]  [<ffffffff818ae971>] ? security_file_permission+0x81/0x90
[  269.150735]  [<ffffffff81239e87>] vfs_read+0xc7/0x190
[  269.150735]  [<ffffffff8123a02f>] sys_read+0x4f/0x90
[  269.150735]  [<ffffffff837cdf39>] system_call_fastpath+0x16/0x1b
[  269.150735] Code: 80 b5 fc 85 e8 51 e8 3d 02 48 8d 7d b8 48 c7 c2 40 d1 a4 84 44 89 fe e8 2e ea ff ff 89 c3 85 c0 75 09 48 8b 7d 
b8 48 85 ff 75 0f <0f> 0b 0f 1f 44 00 00 eb fe 66 0f 1f 44 00 00 48 83 c7 28 31 f6 
[  269.150735] RIP  [<ffffffff813eb711>] ecryptfs_miscdev_read+0x61/0x470
[  269.150735]  RSP <ffff88000baf3e58>
[  269.188128] ---[ end trace 6d450e935ee18981 ]---

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ