lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 20 Jul 2017 09:42:38 +0800
From:   kernel test robot <xiaolong.ye@...el.com>
To:     Daniel Micay <danielmicay@...il.com>
Cc:     Linus Torvalds <torvalds@...ux-foundation.org>,
        Kees Cook <keescook@...omium.org>,
        Arnd Bergmann <arnd@...db.de>,
        Mark Rutland <mark.rutland@....com>,
        Daniel Axtens <dja@...ens.net>,
        Rasmus Villemoes <linux@...musvillemoes.dk>,
        Andy Shevchenko <andriy.shevchenko@...ux.intel.com>,
        Chris Metcalf <cmetcalf@...hip.com>,
        Thomas Gleixner <tglx@...utronix.de>,
        "H. Peter Anvin" <hpa@...or.com>, Ingo Molnar <mingo@...e.hu>,
        Andrew Morton <akpm@...ux-foundation.org>,
        LKML <linux-kernel@...r.kernel.org>, lkp@...org
Subject: [lkp-robot] [include/linux/string.h]  6974f0c455:
 kernel_BUG_at_lib/string.c


FYI, we noticed the following commit:

commit: 6974f0c4555e285ab217cee58b6e874f776ff409 ("include/linux/string.h: add the option of fortified string.h functions")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master

in testcase: boot

on test machine: qemu-system-i386 -enable-kvm -m 256M

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):



[    8.134860] kernel BUG at lib/string.c:985!
[    8.134860] kernel BUG at lib/string.c:985!
[    8.134863] invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC
[    8.134863] invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC
[    8.134864] Modules linked in:
[    8.134864] Modules linked in:
[    8.134867] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 4.12.0-10998-g6974f0c #2
[    8.134867] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 4.12.0-10998-g6974f0c #2
[    8.134869] task: 8005c000 task.stack: 8005e000
[    8.134869] task: 8005c000 task.stack: 8005e000
[    8.134872] EIP: fortify_panic+0xe/0x10
[    8.134872] EIP: fortify_panic+0xe/0x10
[    8.134873] EFLAGS: 00210246 CPU: 0
[    8.134873] EFLAGS: 00210246 CPU: 0
[    8.134875] EAX: 00000022 EBX: 89d33e08 ECX: 00000003 EDX: 784c6e40
[    8.134875] EAX: 00000022 EBX: 89d33e08 ECX: 00000003 EDX: 784c6e40
[    8.134876] ESI: 00000006 EDI: 8be97ffc EBP: 8005fe3c ESP: 8005fe34
[    8.134876] ESI: 00000006 EDI: 8be97ffc EBP: 8005fe3c ESP: 8005fe34
[    8.134878]  DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068
[    8.134878]  DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068
[    8.134879] CR0: 80050033 CR2: 00000000 CR3: 0c67a000 CR4: 00000690
[    8.134879] CR0: 80050033 CR2: 00000000 CR3: 0c67a000 CR4: 00000690
[    8.134882] Call Trace:
[    8.134882] Call Trace:
[    8.134886]  arch_prepare_optimized_kprobe+0xd5/0x171
[    8.134886]  arch_prepare_optimized_kprobe+0xd5/0x171
[    8.134887]  ? 0x90a2c000
[    8.134887]  ? 0x90a2c000
[    8.134889]  ? 0x90a2c000
[    8.134889]  ? 0x90a2c000
[    8.134893]  ? 0x90a2c02a
[    8.134893]  ? 0x90a2c02a
[    8.134894]  ? 0x90a2c039
[    8.134894]  ? 0x90a2c039
[    8.134895]  ? 0x90a2c02f
[    8.134895]  ? 0x90a2c02f
[    8.134898]  alloc_aggr_kprobe+0x3a/0x44
[    8.134898]  alloc_aggr_kprobe+0x3a/0x44
[    8.134900]  register_kprobe+0x366/0x3ca
[    8.134900]  register_kprobe+0x366/0x3ca
[    8.134903]  init_test_probes+0x43/0x41e
[    8.134903]  init_test_probes+0x43/0x41e
[    8.134905]  ? register_module_notifier+0xf/0x11
[    8.134905]  ? register_module_notifier+0xf/0x11
[    8.134909]  init_kprobes+0x25d/0x284
[    8.134909]  init_kprobes+0x25d/0x284
[    8.134912]  ? debugfs_kprobe_init+0xee/0xee
[    8.134912]  ? debugfs_kprobe_init+0xee/0xee
[    8.134914]  do_one_initcall+0x7e/0x121
[    8.134914]  do_one_initcall+0x7e/0x121
[    8.134916]  ? parse_args+0x1a8/0x29b
[    8.134916]  ? parse_args+0x1a8/0x29b
[    8.134921]  ? kernel_init_freeable+0xfd/0x1f8
[    8.134921]  ? kernel_init_freeable+0xfd/0x1f8
[    8.134923]  kernel_init_freeable+0x131/0x1f8
[    8.134923]  kernel_init_freeable+0x131/0x1f8
[    8.134926]  ? rest_init+0xe6/0xe6
[    8.134926]  ? rest_init+0xe6/0xe6
[    8.134928]  kernel_init+0x8/0xd0
[    8.134928]  kernel_init+0x8/0xd0
[    8.134932]  ret_from_fork+0x19/0x24
[    8.134932]  ret_from_fork+0x19/0x24
[    8.134936] Code: e0 83 e1 07 01 d1 39 cb 74 09 89 f0 3a 03 75 05 43 eb f3 31 db 5a 89 d8 5b 5e 5f 5d c3 55 89 e5 50 68 03 df 3e 8c e8 71 8f c9 ff <0f> 0b 55 31 c9 89 e5 56 53 89 d3 89 c6 89 c2 3b 1b 74 16 0f ff
[    8.134936] Code: e0 83 e1 07 01 d1 39 cb 74 09 89 f0 3a 03 75 05 43 eb f3 31 db 5a 89 d8 5b 5e 5f 5d c3 55 89 e5 50 68 03 df 3e 8c e8 71 8f c9 ff <0f> 0b 55 31 c9 89 e5 56 53 89 d3 89 c6 89 c2 3b 1b 74 16 0f ff
[    8.134973] EIP: fortify_panic+0xe/0x10 SS:ESP: 0068:8005fe34
[    8.134973] EIP: fortify_panic+0xe/0x10 SS:ESP: 0068:8005fe34
[    8.134976] ---[ end trace 897c8f39c79b92e0 ]---


To reproduce:

        git clone https://github.com/01org/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> job-script  # job-script is attached in this email



Thanks,
Xiaolong

View attachment "config-4.12.0-10998-g6974f0c" of type "text/plain" (92625 bytes)

Download attachment "dmesg.xz" of type "application/octet-stream" (8140 bytes)

Powered by blists - more mailing lists