lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20201012020742.GD393@shao2-debian>
Date:   Mon, 12 Oct 2020 10:07:42 +0800
From:   kernel test robot <lkp@...el.com>
To:     Arpitha Raghunandan <98.arpi@...il.com>
Cc:     brendanhiggins@...gle.com, skhan@...uxfoundation.org,
        yzaikin@...gle.com, elver@...gle.com, tytso@....edu,
        adilger.kernel@...ger.ca, Arpitha Raghunandan <98.arpi@...il.com>,
        linux-kselftest@...r.kernel.org, kunit-dev@...glegroups.com,
        linux-kernel-mentees@...ts.linuxfoundation.org,
        linux-ext4@...r.kernel.org, linux-kernel@...r.kernel.org,
        0day robot <lkp@...el.com>, lkp@...ts.01.org
Subject: [kunit] c89d849f69: UBSAN:invalid-load_in_lib/kunit/test.c

Greeting,

FYI, we noticed the following commit (built with gcc-9):

commit: c89d849f6934c3f3e65a77dfa9734164218a166e ("[PATCH 1/2] kunit: Support for Parameterized Testing")
url: https://github.com/0day-ci/linux/commits/Arpitha-Raghunandan/kunit-Support-for-Parameterized-Testing/20201011-051918
base: https://git.kernel.org/cgit/linux/kernel/git/tytso/ext4.git dev

in testcase: trinity
version: trinity-i386-4d2343bd-1_20200320
with following parameters:

	runtime: 300s

test-description: Trinity is a linux system call fuzz tester.
test-url: http://codemonkey.org.uk/projects/trinity/


on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 8G

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):


+----------------------------------------+------------+------------+
|                                        | 9cb3701fb5 | c89d849f69 |
+----------------------------------------+------------+------------+
| boot_successes                         | 8          | 0          |
| boot_failures                          | 0          | 6          |
| UBSAN:invalid-load_in_lib/kunit/test.c | 0          | 6          |
+----------------------------------------+------------+------------+


If you fix the issue, kindly add following tag
Reported-by: kernel test robot <lkp@...el.com>


[   86.984701] UBSAN: invalid-load in lib/kunit/test.c:277:11
[   86.986363] load of value 41 is not a valid value for type '_Bool'
[   86.987708] CPU: 0 PID: 289 Comm: kunit_try_catch Not tainted 5.9.0-rc7-00035-gc89d849f6934c #1
[   86.989652] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   86.991492] Call Trace:
[   86.992176]  dump_stack+0x6d/0x99
[   86.992984]  ubsan_epilogue+0x8/0x3e
[   86.993880]  __ubsan_handle_load_invalid_value.cold+0x42/0x47
[   86.995137]  ? _raw_spin_unlock_irqrestore+0x3d/0x40
[   86.996245]  ? lockdep_hardirqs_on_prepare+0xfc/0x1b0
[   86.997386]  kunit_try_run_case.cold+0x10/0x25
[   86.998432]  kunit_generic_run_threadfn_adapter+0xc/0x20
[   86.999629]  kthread+0x107/0x120
[   87.000457]  ? kunit_try_catch_throw+0x20/0x20
[   87.002254]  ? kthread_stop+0x290/0x290
[   87.003108]  ret_from_fork+0x19/0x24
[   87.003952] ================================================================================
[  103.329893]     ok 1 - inode_test_xtimestamp_decoding
[  103.329897] ok 1 - ext4_inode_test
[  103.339337] Btrfs loaded, crc32c=crc32c-intel, integrity-checker=on, ref-verify=on
[  103.341469]     # Subtest: apparmor_policy_unpack
[  103.341471]     1..30
[  103.343065]     ok 1 - policy_unpack_test_inbounds_when_inbounds
[  103.343855]     ok 2 - policy_unpack_test_inbounds_when_out_of_bounds
[  103.345393]     ok 3 - policy_unpack_test_unpack_array_with_null_name
[  103.347053]     ok 4 - policy_unpack_test_unpack_array_with_name
[  103.348677]     ok 5 - policy_unpack_test_unpack_array_out_of_bounds
[  103.350201]     ok 6 - policy_unpack_test_unpack_blob_with_null_name
[  103.351867]     ok 7 - policy_unpack_test_unpack_blob_with_name
[  103.353558]     ok 8 - policy_unpack_test_unpack_blob_out_of_bounds
[  103.355165]     ok 9 - policy_unpack_test_unpack_nameX_with_null_name
[  103.356794]     ok 10 - policy_unpack_test_unpack_nameX_with_wrong_code
[  103.358646]     ok 11 - policy_unpack_test_unpack_nameX_with_name
[  103.360375]     ok 12 - policy_unpack_test_unpack_nameX_with_wrong_name
[  103.361921]     ok 13 - policy_unpack_test_unpack_str_with_null_name
[  103.365212]     ok 14 - policy_unpack_test_unpack_str_with_name
[  103.370046]     ok 15 - policy_unpack_test_unpack_str_out_of_bounds
[  103.371617]     ok 16 - policy_unpack_test_unpack_strdup_with_null_name
[  103.373347]     ok 17 - policy_unpack_test_unpack_strdup_with_name
[  103.375023]     ok 18 - policy_unpack_test_unpack_strdup_out_of_bounds
[  103.376544]     ok 19 - policy_unpack_test_unpack_u16_chunk_basic
[  103.378152]     ok 20 - policy_unpack_test_unpack_u16_chunk_out_of_bounds_1
[  103.379736]     ok 21 - policy_unpack_test_unpack_u16_chunk_out_of_bounds_2
[  103.381438]     ok 22 - policy_unpack_test_unpack_u32_with_null_name
[  103.388133]     ok 23 - policy_unpack_test_unpack_u32_with_name
[  103.389767]     ok 24 - policy_unpack_test_unpack_u32_out_of_bounds
[  103.391356]     ok 25 - policy_unpack_test_unpack_u64_with_null_name
[  103.393195]     ok 26 - policy_unpack_test_unpack_u64_with_name
[  103.394780]     ok 27 - policy_unpack_test_unpack_u64_out_of_bounds
[  103.396308]     ok 28 - policy_unpack_test_unpack_X_code_match
[  103.397961]     ok 29 - policy_unpack_test_unpack_X_code_mismatch
[  103.399374]     ok 30 - policy_unpack_test_unpack_X_out_of_bounds
[  103.400753] ok 2 - apparmor_policy_unpack
[  103.403320] AppArmor: AppArmor sha1 policy hashing enabled
[  103.410418] ima: No TPM chip found, activating TPM-bypass!
[  103.411805] ima: Allocated hash algorithm: sha256
[  103.413187] ima: No architecture policies found
[  103.416171]     # Subtest: kunit-try-catch-test
[  103.416175]     1..2
[  105.412314] rcu-torture: rcu_torture_read_exit: Start of episode
[  105.458748] rcu-torture: rcu_torture_read_exit: End of episode
[  106.171539] kunit_try_catch (9479) used greatest stack depth: 6392 bytes left
[  112.831599] kunit_try_catch (26158) used greatest stack depth: 6368 bytes left
[  119.013165] rcu-torture: rcu_torture_read_exit: Start of episode
[  119.244274] rcu-torture: rcu_torture_read_exit: End of episode
[  132.852213] rcu-torture: rcu_torture_read_exit: Start of episode
[  135.816147] rcu-torture: rcu_torture_read_exit: End of episode
[  140.942223] rcu-torture: rtc: (ptrval) ver: 1070 tfle: 0 rta: 1071 rtaf: 0 rtf: 1061 rtmbe: 0 rtbe: 0 rtbke: 0 rtbre: 0 rtbf: 0 rtb: 0 nt: 4157 onoff: 0/0:0/0 -1,0:-1,0 0:0 (HZ=100) barrier: 0/0:0 read-exits: 135
[  140.946168] rcu-torture: Reader Pipe:  9171121 50 0 0 0 0 0 0 0 0 0
[  140.947629] rcu-torture: Reader Batch:  9170828 343 0 0 0 0 0 0 0 0 0
[  140.949106] rcu-torture: Free-Block Circulation:  1070 1069 1068 1067 1066 1065 1064 1063 1062 1061 0
[  149.412890] rcu-torture: rcu_torture_read_exit: Start of episode
[  149.579098] rcu-torture: rcu_torture_read_exit: End of episode
[  163.172214] rcu-torture: rcu_torture_read_exit: Start of episode
[  163.194427] rcu-torture: rcu_torture_read_exit: End of episode
[  176.782188] rcu-torture: rcu_torture_read_exit: Start of episode
[  176.818242] rcu-torture: rcu_torture_read_exit: End of episode
[  180.452640] rcu_torture_fwd_prog_nr: Duration 10026 cver 1689 gps 4385
[  190.532908] rcu-torture: rcu_torture_read_exit: Start of episode
[  190.544968] rcu-torture: rcu_torture_read_exit: End of episode
[  202.383687] rcu-torture: rtc: (ptrval) ver: 2405 tfle: 0 rta: 2405 rtaf: 0 rtf: 2393 rtmbe: 0 rtbe: 0 rtbke: 0 rtbre: 0 rtbf: 0 rtb: 0 nt: 6439 onoff: 0/0:0/0 -1,0:-1,0 0:0 (HZ=100) barrier: 0/0:0 read-exits: 203
[  202.387918] rcu-torture: Reader Pipe:  14079393 218 0 0 0 0 0 0 0 0 0
[  202.389371] rcu-torture: Reader Batch:  14078475 1136 0 0 0 0 0 0 0 0 0
[  202.390876] rcu-torture: Free-Block Circulation:  2404 2404 2403 2402 2401 2399 2398 2397 2394 2393 0
[  204.212351] rcu-torture: rcu_torture_read_exit: Start of episode
[  204.231090] rcu-torture: rcu_torture_read_exit: End of episode
[  219.206128] rcu-torture: rcu_torture_read_exit: Start of episode
[  219.357586] rcu-torture: rcu_torture_read_exit: End of episode
[  233.254429] rcu-torture: rcu_torture_read_exit: Start of episode
[  233.446637] rcu-torture: rcu_torture_read_exit: End of episode
[  247.252348] rcu-torture: rcu_torture_read_exit: Start of episode
[  248.612429] rcu-torture: rcu_torture_read_exit: End of episode
[  262.212257] rcu-torture: rcu_torture_read_exit: Start of episode
[  262.238186] rcu-torture: rcu_torture_read_exit: End of episode
[  263.820785] rcu-torture: rtc: (ptrval) ver: 3552 tfle: 0 rta: 3553 rtaf: 0 rtf: 3539 rtmbe: 0 rtbe: 0 rtbke: 0 rtbre: 0 rtbf: 0 rtb: 0 nt: 8461 onoff: 0/0:0/0 -1,0:-1,0 0:0 (HZ=100) barrier: 0/0:0 read-exits: 288
[  263.841057] rcu-torture: Reader Pipe:  18852184 371 0 0 0 0 0 0 0 0 0
[  263.842544] rcu-torture: Reader Batch:  18850453 2102 0 0 0 0 0 0 0 0 0
[  263.844013] rcu-torture: Free-Block Circulation:  3552 3552 3551 3549 3547 3546 3545 3543 3541 3540 0
[  275.820884] rcu-torture: rcu_torture_read_exit: Start of episode
[  276.012299] rcu-torture: rcu_torture_read_exit: End of episode
[  289.572388] rcu-torture: rcu_torture_read_exit: Start of episode


To reproduce:

        # build kernel
	cd linux
	cp config-5.9.0-rc7-00035-gc89d849f6934c .config
	make HOSTCC=gcc-9 CC=gcc-9 ARCH=i386 olddefconfig prepare modules_prepare bzImage

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> job-script # job-script is attached in this email



Thanks,
lkp


View attachment "config-5.9.0-rc7-00035-gc89d849f6934c" of type "text/plain" (153131 bytes)

View attachment "job-script" of type "text/plain" (4361 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (19800 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ