lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <574b3f18.r6FgrTMbVUsrxFpJ%xiaolong.ye@intel.com>
Date:	Mon, 30 May 2016 03:12:24 +0800
From:	kernel test robot <xiaolong.ye@...el.com>
To:	Andy Lutomirski <luto@...nel.org>
Cc:	lkp@...org, Andy Lutomirski <luto@...capital.net>,
	LKML <linux-kernel@...r.kernel.org>
Subject: [[DEBUG] force CONFIG_DEBUG_UACCESS] 8829c7a53e: BUG: tried to
 access memory at 0x7f962a0f while not in USER_DS



FYI, we noticed the following commit:

https://git.kernel.org/pub/scm/linux/kernel/git/luto/linux.git x86/uaccess
commit 8829c7a53e1b4e44f6c24c6d165cf9d1cf8b1f14 ("[DEBUG] force CONFIG_DEBUG_UACCESS")


on test machine: vm-lkp-wsx03-yocto-i386: 1 threads qemu-system-i386 -enable-kvm with 320M memory

caused below changes:


+----------------+------------+------------+
|                | d126f75418 | 8829c7a53e |
+----------------+------------+------------+
| boot_successes | 10         | 0          |
+----------------+------------+------------+



[    4.297648] Write protecting the kernel text: 4744k
[    4.298607] Write protecting the kernel read-only data: 2404k
[    4.298607] Write protecting the kernel read-only data: 2404k
[    4.307394] BUG: tried to access memory at 0x7f962a0f while not in USER_DS
[    4.307394] BUG: tried to access memory at 0x7f962a0f while not in USER_DS
[    4.308810] ------------[ cut here ]------------
[    4.308810] ------------[ cut here ]------------
[    4.309748] kernel BUG at arch/x86/mm/extable.c:189!
[    4.309748] kernel BUG at arch/x86/mm/extable.c:189!
[    4.311080] invalid opcode: 0000 [#1] 
[    4.311080] invalid opcode: 0000 [#1] DEBUG_PAGEALLOC DEBUG_PAGEALLOC 

[    4.312088] Modules linked in:
[    4.312088] Modules linked in:

[    4.312684] CPU: 0 PID: 89 Comm: init Not tainted 4.6.0-rc6-00086-g8829c7a #1
[    4.312684] CPU: 0 PID: 89 Comm: init Not tainted 4.6.0-rc6-00086-g8829c7a #1
[    4.314033] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Debian-1.8.2-1 04/01/2014
[    4.314033] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Debian-1.8.2-1 04/01/2014
[    4.315738] task: 9042ccc0 ti: 904aa000 task.ti: 904aa000
[    4.315738] task: 9042ccc0 ti: 904aa000 task.ti: 904aa000
[    4.316763] EIP: 0060:[<8103bd06>] EFLAGS: 00010296 CPU: 0
[    4.316763] EIP: 0060:[<8103bd06>] EFLAGS: 00010296 CPU: 0
[    4.317826] EIP is at bad_uaccess_kernel_ds+0x16/0x20
[    4.317826] EIP is at bad_uaccess_kernel_ds+0x16/0x20
[    4.318795] EAX: 0000003e EBX: 7f962a0c ECX: 9042ccc0 EDX: 00000001
[    4.318795] EAX: 0000003e EBX: 7f962a0c ECX: 9042ccc0 EDX: 00000001
[    4.319973] ESI: 00000000 EDI: 9042ccc0 EBP: 904abf18 ESP: 904abf10
[    4.319973] ESI: 00000000 EDI: 9042ccc0 EBP: 904abf18 ESP: 904abf10
[    4.321150]  DS: 007b ES: 007b FS: 0000 GS: 00e0 SS: 0068
[    4.321150]  DS: 007b ES: 007b FS: 0000 GS: 00e0 SS: 0068
[    4.322170] CR0: 80050033 CR2: 0804f520 CR3: 1049f000 CR4: 00000690
[    4.322170] CR0: 80050033 CR2: 0804f520 CR3: 1049f000 CR4: 00000690
[    4.323358] Stack:
[    4.323358] Stack:
[    4.323746]  81646e0c
[    4.323746]  81646e0c 7f962a0f 7f962a0f 904abf2c 904abf2c 811312b6 811312b6 90b87c10 90b87c10 00000001 00000001 80130020 80130020 904abf68 904abf68

[    4.325319]  811323d7
[    4.325319]  811323d7 00000002 00000002 00000000 00000000 00000000 00000000 81132006 81132006 9048f97c 9048f97c 00000000 00000000 90b87c10 90b87c10

[    4.326898]  7f962a0c
[    4.326898]  7f962a0c 9048f920 9048f920 00000000 00000000 904abfac 904abfac 904aa000 904aa000 47fdcff4 47fdcff4 904abf78 904abf78 811328e9 811328e9

[    4.328489] Call Trace:
[    4.328489] Call Trace:
[    4.328958]  [<811312b6>] count+0x66/0xa0
[    4.328958]  [<811312b6>] count+0x66/0xa0
[    4.329948]  [<811323d7>] do_execveat_common+0x4a7/0x740
[    4.329948]  [<811323d7>] do_execveat_common+0x4a7/0x740
[    4.330947]  [<81132006>] ? do_execveat_common+0xd6/0x740
[    4.330947]  [<81132006>] ? do_execveat_common+0xd6/0x740
[    4.331962]  [<811328e9>] SyS_execve+0x29/0x30
[    4.331962]  [<811328e9>] SyS_execve+0x29/0x30
[    4.332801]  [<81001360>] do_int80_syscall_32+0x70/0x1c0
[    4.332801]  [<81001360>] do_int80_syscall_32+0x70/0x1c0
[    4.333811]  [<814a04a6>] entry_INT80_32+0x36/0x36
[    4.333811]  [<814a04a6>] entry_INT80_32+0x36/0x36
[    4.334711] Code:
[    4.334711] Code: 90 90 8d 8d 74 74 26 26 00 00 31 31 c0 c0 5d 5d c3 c3 8d 8d b6 b6 00 00 00 00 00 00 00 00 8d 8d bf bf 00 00 00 00 00 00 00 00 55 55 89 89 e5 e5 83 83 ec ec 08 08 89 89 44 44 24 24 04 04 c7 c7 04 04 24 24 0c 0c 6e 6e 64 64 81 81 e8 e8 26 26 b2 b2 0a 0a 00 00 <0f> <0f> 0b 0b 90 90 8d 8d b4 b4 26 26 00 00 00 00 00 00 00 00 55 55 89 89 e5 e5 83 83 ec ec 18 18 89 89 5d 5d f4 f4 89 89 c3 c3

[    4.339197] EIP: [<8103bd06>] 
[    4.339197] EIP: [<8103bd06>] bad_uaccess_kernel_ds+0x16/0x20bad_uaccess_kernel_ds+0x16/0x20 SS:ESP 0068:904abf10
 SS:ESP 0068:904abf10
[    4.340676] ---[ end trace ee8a6b2c126871eb ]---
[    4.340676] ---[ end trace ee8a6b2c126871eb ]---


FYI, raw QEMU command line is:

	qemu-system-i386 -enable-kvm -kernel /pkg/linux/i386-randconfig-n0-201622/gcc-6/8829c7a53e1b4e44f6c24c6d165cf9d1cf8b1f14/vmlinuz-4.6.0-rc6-00086-g8829c7a -append 'root=/dev/ram0 user=lkp job=/lkp/scheduled/vm-lkp-wsx03-yocto-i386-11/bisect_boot-1-yocto-minimal-i386.cgz-i386-randconfig-n0-201622-8829c7a53e1b4e44f6c24c6d165cf9d1cf8b1f14-20160530-94983-1lh2mjs-0.yaml ARCH=i386 kconfig=i386-randconfig-n0-201622 branch=luto/x86/uaccess commit=8829c7a53e1b4e44f6c24c6d165cf9d1cf8b1f14 BOOT_IMAGE=/pkg/linux/i386-randconfig-n0-201622/gcc-6/8829c7a53e1b4e44f6c24c6d165cf9d1cf8b1f14/vmlinuz-4.6.0-rc6-00086-g8829c7a max_uptime=600 RESULT_ROOT=/result/boot/1/vm-lkp-wsx03-yocto-i386/yocto-minimal-i386.cgz/i386-randconfig-n0-201622/gcc-6/8829c7a53e1b4e44f6c24c6d165cf9d1cf8b1f14/0 LKP_SERVER=inn earlyprintk=ttyS0,115200 systemd.log_level=err debug apic=debug sysrq_always_enabled rcupdate.rcu_cpu_stall_timeout=100 panic=-1 softlockup_panic=1 nmi_watchdog=panic oops=panic load_ramdisk=2 prompt_ramdisk=0 console=ttyS0,115200 console=tty0 vga=normal rw ip=::::vm-lkp-wsx03-yocto-i386-11::dhcp drbd.minor_count=8'  -initrd /fs/sdc1/initrd-vm-lkp-wsx03-yocto-i386-11 -m 320 -smp 1 -device e1000,netdev=net0 -netdev user,id=net0 -boot order=nc -no-reboot -watchdog i6300esb -rtc base=localtime -drive file=/fs/sdc1/disk0-vm-lkp-wsx03-yocto-i386-11,media=disk,if=virtio -pidfile /dev/shm/kboot/pid-vm-lkp-wsx03-yocto-i386-11 -serial file:/dev/shm/kboot/serial-vm-lkp-wsx03-yocto-i386-11 -daemonize -display none -monitor null 





Thanks,
Kernel Test Robot

View attachment "config-4.6.0-rc6-00086-g8829c7a" of type "text/plain" (87104 bytes)

Download attachment "dmesg.xz" of type "application/octet-stream" (10272 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ