lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20160807140242.GA21617@yexl-desktop>
Date:	Sun, 7 Aug 2016 22:02:42 +0800
From:	kernel test robot <xiaolong.ye@...el.com>
To:	Nicholas Krause <xerofoify@...il.com>
Cc:	0day robot <fengguang.wu@...el.com>,
	LKML <linux-kernel@...r.kernel.org>, lkp@...org
Subject: [lkp] [fs]  45ec18d5c7: BUG: KASAN: user-memory-access on address
 00007f90291c7ec0


FYI, we noticed the following commit:

https://github.com/0day-ci/linux Nicholas-Krause/fs-Fix-kmemleak-leak-warning-in-getname_flags-about-working-on-unitialized-memory/20160804-055054
commit 45ec18d5c713bccb9807782f0dca29b92ba99784 ("fs:Fix kmemleak leak warning in getname_flags about working on unitialized memory")

in testcase: boot

on test machine: 1 threads qemu-system-x86_64 -enable-kvm -cpu SandyBridge with 512M memory

caused below changes:


+-----------------------------------------------------------+------------+------------+
|                                                           | bf0f500bd0 | 45ec18d5c7 |
+-----------------------------------------------------------+------------+------------+
| boot_successes                                            | 1          | 0          |
| boot_failures                                             | 5          | 8          |
| IP-Config:Auto-configuration_of_network_failed            | 1          |            |
| Kernel_panic-not_syncing:Attempted_to_kill_init!exitcode= | 4          |            |
| BUG:KASAN:user-memory-access_on_address                   | 0          | 8          |
| backtrace:SyS_access                                      | 0          | 8          |
| backtrace:SyS_open                                        | 0          | 8          |
| backtrace:SyS_newstat                                     | 0          | 8          |
| backtrace:user_path_at_empty                              | 0          | 8          |
| backtrace:SyS_chdir                                       | 0          | 8          |
| backtrace:SyS_mount                                       | 0          | 2          |
| backtrace:SyS_inotify_add_watch                           | 0          | 2          |
| backtrace:SyS_openat                                      | 0          | 2          |
| backtrace:getname                                         | 0          | 1          |
| backtrace:SyS_execve                                      | 0          | 1          |
+-----------------------------------------------------------+------------+------------+



[   22.168057] hgafb: HGA card not detected.
[   22.169497] hgafb: probe of hgafb.0 failed with error -22
[   22.175454] ==================================================================
[   22.178607] BUG: KASAN: user-memory-access on address 00007f90291c7ec0
[   22.180409] Read of size 18 by task v86d/170
[   22.181842] CPU: 0 PID: 170 Comm: v86d Not tainted 4.7.0-11542-g45ec18d #1
[   22.183693] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Debian-1.8.2-1 04/01/2014
[   22.186659]  0000000000000000 ffff880017dd7d50 ffffffff816c3199 00007f90291c7ec0
[   22.189636]  ffff880016d58000 ffff880017dd7dc8 ffffffff81258765 ffffffff8127d2b7
[   22.192622]  0000000000000296 0000000000000001 ffff880017dd7de0 ffff880017dd7d90
[   22.195581] Call Trace:
[   22.196728]  [<ffffffff816c3199>] dump_stack+0x61/0x7d
[   22.198303]  [<ffffffff81258765>] kasan_report+0x115/0x42a
[   22.201054]  [<ffffffff8127d2b7>] ? getname_flags+0x1ee/0x235
[   22.202731]  [<ffffffff81257e49>] ? kasan_slab_alloc+0x12/0x14
[   22.204425]  [<ffffffff8125784f>] check_memory_region+0x127/0x12c
[   22.206193]  [<ffffffff81257a88>] memcpy+0x23/0x4c
[   22.207706]  [<ffffffff8127d2b7>] getname_flags+0x1ee/0x235
[   22.209358]  [<ffffffff812810ca>] user_path_at_empty+0x23/0x3d
[   22.211055]  [<ffffffff8126cce5>] SYSC_faccessat+0x1aa/0x301
[   22.212714]  [<ffffffff8126cb3b>] ? do_dentry_open+0x380/0x380
[   22.214402]  [<ffffffff81053620>] ? trace_do_page_fault+0x60/0x12b


FYI, raw QEMU command line is:

	qemu-system-x86_64 -enable-kvm -cpu SandyBridge -kernel /pkg/linux/x86_64-randconfig-r0-08050401/gcc-6/45ec18d5c713bccb9807782f0dca29b92ba99784/vmlinuz-4.7.0-11542-g45ec18d -append 'ip=::::vm-kbuild-yocto-x86_64-7::dhcp root=/dev/ram0 user=lkp job=/lkp/scheduled/vm-kbuild-yocto-x86_64-7/boot-1-yocto-minimal-x86_64.cgz-45ec18d5c713bccb9807782f0dca29b92ba99784-20160806-40923-q89nw-0.yaml ARCH=x86_64 kconfig=x86_64-randconfig-r0-08050401 branch=linux-devel/devel-hourly-2016080500 commit=45ec18d5c713bccb9807782f0dca29b92ba99784 BOOT_IMAGE=/pkg/linux/x86_64-randconfig-r0-08050401/gcc-6/45ec18d5c713bccb9807782f0dca29b92ba99784/vmlinuz-4.7.0-11542-g45ec18d max_uptime=600 RESULT_ROOT=/result/boot/1/vm-kbuild-yocto-x86_64/yocto-minimal-x86_64.cgz/x86_64-randconfig-r0-08050401/gcc-6/45ec18d5c713bccb9807782f0dca29b92ba99784/0 LKP_SERVER=inn debug apic=debug sysrq_always_enabled rcupdate.rcu_cpu_stall_timeout=100 panic=-1 softlockup_panic=1 nmi_watchdog=panic oops=panic load_ramdisk=2 prompt_ramdisk=0 systemd.log_level=err ignore_loglevel earlyprintk=ttyS0,115200 console=ttyS0,115200 console=tty0 vga=normal rw drbd.minor_count=8'  -initrd /fs/sdd1/initrd-vm-kbuild-yocto-x86_64-7 -m 512 -smp 1 -device e1000,netdev=net0 -netdev user,id=net0 -boot order=nc -no-reboot -watchdog i6300esb -watchdog-action debug -rtc base=localtime -drive file=/fs/sdd1/disk0-vm-kbuild-yocto-x86_64-7,media=disk,if=virtio -pidfile /dev/shm/kboot/pid-vm-kbuild-yocto-x86_64-7 -serial file:/dev/shm/kboot/serial-vm-kbuild-yocto-x86_64-7 -daemonize -display none -monitor null 





Thanks,
Xiaolong

View attachment "config-4.7.0-11542-g45ec18d" of type "text/plain" (99985 bytes)

Download attachment "dmesg.xz" of type "application/octet-stream" (22696 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ