lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Thu, 12 Oct 2017 14:54:50 +0800
From:   kernel test robot <xiaolong.ye@...el.com>
To:     Miklos Szeredi <mszeredi@...hat.com>
Cc:     linux-fsdevel@...r.kernel.org, linux-kernel@...r.kernel.org,
        Al Viro <viro@...iv.linux.org.uk>, lkp@...org,
        ltp@...ts.linux.it
Subject: [lkp-robot] [proc/locks]  1dc17d8d81:
 dmesg.BUG:sleeping_function_called_from_invalid_context_at_security/selinux/hooks.c


FYI, we noticed the following commit (built with gcc-6):

commit: 1dc17d8d8186a630f6957c20987828dc555a3ca0 ("proc/locks: getattr dev and ino")
url: https://github.com/0day-ci/linux/commits/Miklos-Szeredi/proc-locks-getattr-dev-and-ino/20170923-075038


in testcase: ltp
with following parameters:

	test: fs

test-description: The LTP testsuite contains a collection of tools for testing the Linux kernel and related features.
test-url: http://linux-test-project.github.io/


on test machine: 88 threads Intel(R) Xeon(R) CPU E5-2699 v4 @ 2.20GHz with 64G memory

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):


kern  :err   : [ 1093.251043] BUG: sleeping function called from invalid context at security/selinux/hooks.c:264
kern  :err   : [ 1093.262891] in_atomic(): 1, irqs_disabled(): 0, pid: 10678, name: proc01
kern  :warn  : [ 1093.270934] CPU: 73 PID: 10678 Comm: proc01 Not tainted 4.14.0-rc1-00040-g1dc17d8 #2
kern  :warn  : [ 1093.280140] Hardware name: Intel Corporation S2600KPR/S2600KPR, BIOS SE5C610.86B.01.01.0019.101220160604 10/12/2016
kern  :warn  : [ 1093.292381] Call Trace:
kern  :warn  : [ 1093.295704]  dump_stack+0x63/0x86
kern  :warn  : [ 1093.299997]  ___might_sleep+0xf1/0x110
kern  :warn  : [ 1093.304770]  __might_sleep+0x4a/0x80
kern  :warn  : [ 1093.309346]  __inode_security_revalidate+0x63/0x80
kern  :warn  : [ 1093.315285]  selinux_inode_getattr+0x4a/0x90
kern  :warn  : [ 1093.320645]  ? seq_vprintf+0x35/0x50
kern  :warn  : [ 1093.325226]  security_inode_getattr+0x41/0x60
kern  :warn  : [ 1093.330681]  vfs_getattr+0x21/0x40
kern  :warn  : [ 1093.335067]  lock_get_status+0x1a9/0x3a0
kern  :warn  : [ 1093.340028]  ? __might_sleep+0x4a/0x80
kern  :warn  : [ 1093.344806]  ? find_next_bit+0xb/0x10
kern  :warn  : [ 1093.349478]  ? find_next_bit+0xb/0x10
kern  :warn  : [ 1093.354144]  locks_show+0x43/0xc0
kern  :warn  : [ 1093.358419]  seq_read+0xdc/0x390
kern  :warn  : [ 1093.362593]  ? __might_sleep+0x4a/0x80
kern  :warn  : [ 1093.367351]  proc_reg_read+0x42/0x70
kern  :warn  : [ 1093.371907]  __vfs_read+0x28/0x140
kern  :warn  : [ 1093.376269]  ? security_file_permission+0x9b/0xc0
kern  :warn  : [ 1093.382091]  ? rw_verify_area+0x4e/0xb0
kern  :warn  : [ 1093.386945]  vfs_read+0xa8/0x150
kern  :warn  : [ 1093.391117]  SyS_read+0x46/0xa0
kern  :warn  : [ 1093.395196]  entry_SYSCALL_64_fastpath+0x1a/0xa5
kern  :warn  : [ 1093.400916] RIP: 0033:0x7f70468a4b2c
kern  :warn  : [ 1093.405462] RSP: 002b:00007ffff546bdc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
kern  :warn  : [ 1093.414492] RAX: ffffffffffffffda RBX: 00007ffff546cf60 RCX: 00007f70468a4b2c
kern  :warn  : [ 1093.423045] RDX: 0000000000000400 RSI: 000056348ba5f660 RDI: 0000000000000008
kern  :warn  : [ 1093.431608] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000b
kern  :warn  : [ 1093.440176] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000d26
kern  :warn  : [ 1093.448743] R13: 0000000000000008 R14: 000056348ba5f660 R15: 0000000000000000
user  :warn  : [ 1095.775123] LTP: starting fs_racer (fs_racer.sh -t 5)


To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp install job.yaml  # job file is attached in this email
        bin/lkp run     job.yaml



Thanks,
Xiaolong

View attachment "config-4.14.0-rc1-00040-g1dc17d8" of type "text/plain" (163200 bytes)

View attachment "job-script" of type "text/plain" (4324 bytes)

Download attachment "kmsg.xz" of type "application/x-xz" (43216 bytes)

View attachment "ltp" of type "text/plain" (152723 bytes)

View attachment "job.yaml" of type "text/plain" (3615 bytes)

View attachment "reproduce" of type "text/plain" (77 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ