lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Mon, 8 May 2017 11:42:08 -0700
From:   Eric Biggers <ebiggers@...gle.com>
To:     kernel test robot <xiaolong.ye@...el.com>
Cc:     David Howells <dhowells@...hat.com>,
        LKML <linux-kernel@...r.kernel.org>,
        Stephen Rothwell <sfr@...b.auug.org.au>, lkp@...org
Subject: Re: [lkp-robot] [KEYS]  98f7748967: BUG:unable_to_handle_kernel

On Mon, May 08, 2017 at 09:23:16AM +0800, kernel test robot wrote:
> [   16.476188] BUG: unable to handle kernel NULL pointer dereference at           (null)
> [   16.478886] IP: memset_erms+0x9/0x10
> [   16.480180] PGD a9a067 
> [   16.480181] PUD a9b067 
> [   16.481283] PMD 0 
> [   16.482389] 
> [   16.484358] Oops: 0002 [#1] SMP
> [   16.485573] Modules linked in: pptp gre l2tp_ppp l2tp_netlink l2tp_core ip6_udp_tunnel udp_tunnel pppoe pppox ppp_generic slhc nfnetlink scsi_transport_iscsi dccp_ipv6 atm sctp dccp_ipv4 dccp
> [   16.490424] CPU: 0 PID: 311 Comm: trinity-c2 Not tainted 4.11.0-rc4-00106-g98f7748 #1
> [   16.493066] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.9.3-20161025_171302-gandalf 04/01/2014
> [   16.496072] task: ffff8800195425c0 task.stack: ffffc90000338000
> [   16.499768] RIP: 0010:memset_erms+0x9/0x10
> [   16.501145] RSP: 0018:ffffc9000033bea8 EFLAGS: 00010246
> [   16.502717] RAX: ffffffffffffff00 RBX: 0000000000000000 RCX: 0000000000000001
> [   16.504650] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000000000000
> [   16.506550] RBP: ffffc9000033beb8 R08: 0000000000000020 R09: 0000000000000000
> [   16.508420] R10: 8080808080808080 R11: fefefefefefefeff R12: ffffffffffffff82
> [   16.510312] R13: 0000000000000000 R14: 0000000000000000 R15: ffffffffffffff82
> [   16.512193] FS:  0000000000000000(0000) GS:ffff88000be00000(0063) knlGS:0000000009cf1840
> [   16.514822] CS:  0010 DS: 002b ES: 002b CR0: 0000000080050033
> [   16.516468] CR2: 0000000000000000 CR3: 0000000000a99000 CR4: 00000000001406f0
> [   16.518369] Call Trace:
> [   16.519468]  ? memzero_explicit+0x12/0x20
> [   16.520838]  SyS_add_key+0x14c/0x1f0
> [   16.522133]  do_fast_syscall_32+0xab/0x250
> [   16.523508]  entry_SYSENTER_compat+0x4c/0x5b
> [   16.524913] RIP: 0023:0xf77d5c99
> [   16.526137] RSP: 002b:00000000ffccaf0c EFLAGS: 00000292 ORIG_RAX: 000000000000011e
> [   16.544091] RAX: ffffffffffffffda RBX: 00000000080ecb3d RCX: 0000000000000000
> [   16.545969] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000102100a5
> [   16.547857] RBP: 0000000040000000 R08: 0000000000000000 R09: 0000000000000000
> [   16.549732] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
> [   16.551615] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
> [   16.553491] Code: 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 <f3> aa 4c 89 c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 
> [   16.558559] RIP: memset_erms+0x9/0x10 RSP: ffffc9000033bea8
> [   16.560177] CR2: 0000000000000000
> [   16.561464] ---[ end trace 9432180228dd30ad ]---

Nice to see this is getting tested!  David, as I've said previously, and as I
noted in the commit message itself, this cannot be applied until "KEYS: fix
dereferencing NULL payload with nonzero length" has also been applied.

- Eric

Powered by blists - more mailing lists