lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Mon, 26 Nov 2018 08:20:37 +0800
From:   kernel test robot <rong.a.chen@...el.com>
To:     David Howells <dhowells@...hat.com>
Cc:     Al Viro <viro@...iv.linux.org.uk>,
        LKML <linux-kernel@...r.kernel.org>,
        linux-fsdevel@...r.kernel.org, lkp@...org
Subject: [LKP] [NFS] be11360100: BUG:unable_to_handle_kernel

FYI, we noticed the following commit (built with gcc-7):

commit: be11360100bc863eee87491db1f6693b1b7f2ce8 ("NFS: Add fs_context support.")
https://git.kernel.org/cgit/linux/kernel/git/viro/vfs.git Q13

in testcase: rcutorture
with following parameters:

	runtime: 300s
	test: default

test-description: rcutorture is rcutorture kernel module load/unload test.
test-url: https://www.kernel.org/doc/Documentation/RCU/torture.txt


on test machine: qemu-system-x86_64 -enable-kvm -cpu host -smp 2 -m 4G

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):


+------------------------------------------+------------+------------+
|                                          | 212604ad52 | be11360100 |
+------------------------------------------+------------+------------+
| boot_successes                           | 8          | 4          |
| boot_failures                            | 0          | 4          |
| BUG:unable_to_handle_kernel              | 0          | 4          |
| Oops:#[##]                               | 0          | 4          |
| RIP:security_sb_set_mnt_opts             | 0          | 4          |
| Kernel_panic-not_syncing:Fatal_exception | 0          | 4          |
+------------------------------------------+------------+------------+



[   10.897952] BUG: unable to handle kernel NULL pointer dereference at 0000000000000010
[   10.900419] PGD 0 P4D 0 
[   10.901075] Oops: 0000 [#1] SMP PTI
[   10.901879] CPU: 0 PID: 397 Comm: mount.nfs Not tainted 4.20.0-rc1-00053-gbe11360 #1
[   10.903679] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014
[   10.905551] RIP: 0010:security_sb_set_mnt_opts+0x15/0x60
[   10.906641] Code: 48 83 c4 20 5b c3 b8 ff ff ff ff eb f3 90 90 90 90 90 90 90 90 66 66 66 66 90 41 56 41 55 49 89 d5 41 54 55 ba a1 ff ff ff 53 <8b> 46 10 48 8b 1d 11 35 cf 01 85 c0 0f 45 c2 48 85 db 74 2a 49 89
[   10.910451] RSP: 0000:ffffc90000b37d50 EFLAGS: 00010246
[   10.911647] RAX: ffff88007eab6800 RBX: ffff88007fe0c800 RCX: ffffc90000b37d80
[   10.913032] RDX: 00000000ffffffa1 RSI: 0000000000000000 RDI: ffff88007fe0c800
[   10.914519] RBP: ffff88007eacfcc0 R08: 0000000000026080 R09: ffffffff8139e68c
[   10.916254] R10: ffffea0001fa8c40 R11: 0000000000000000 R12: ffff88007eab6800
[   10.917629] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000
[   10.919055] FS:  00007fc345e7e480(0000) GS:ffff88013fc00000(0000) knlGS:0000000000000000
[   10.920740] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   10.922115] CR2: 0000000000000010 CR3: 000000007fc9a003 CR4: 00000000000606f0
[   10.923502] Call Trace:
[   10.924849]  nfs_set_sb_security+0x44/0x90
[   10.925987]  nfs_get_tree_common+0xda/0x330
[   10.927121]  nfs_try_get_tree+0x68/0x2b0
[   10.928325]  ? get_nfs_version+0x21/0x80
[   10.929312]  vfs_get_tree+0x61/0x160
[   10.930157]  do_mount+0x7ab/0xa30
[   10.931129]  ksys_mount+0x80/0xd0
[   10.932007]  __x64_sys_mount+0x21/0x30
[   10.932900]  do_syscall_64+0x5b/0x180
[   10.933769]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[   10.934861] RIP: 0033:0x7fc34553a24a
[   10.935749] Code: 48 8b 0d 51 fc 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 1e fc 2a 00 f7 d8 64 89 01 48
[   10.939478] RSP: 002b:00007ffded626dd8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[   10.941214] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc34553a24a
[   10.942667] RDX: 0000559593458f90 RSI: 0000559593458f70 RDI: 0000559593457230
[   10.944285] RBP: 00007ffded626fd0 R08: 0000559593464340 R09: 0000000000000060
[   10.945664] R10: 0000000000000000 R11: 0000000000000206 R12: 00007fc345e7e410
[   10.947368] R13: 00007ffded626fd0 R14: 00007ffded626ed0 R15: 0000559593464320
[   10.949004] Modules linked in: sb_edac crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel sr_mod cdrom sg ata_generic pata_acpi ppdev snd_pcm snd_timer snd aesni_intel crypto_simd soundcore cryptd glue_helper pcspkr serio_raw ata_piix i2c_piix4 libata floppy parport_pc parport ip_tables
[   10.955035] CR2: 0000000000000010
[   10.956057] ---[ end trace d676ee32142f0850 ]---


To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> job-script # job-script is attached in this email



Thanks,
lkp

View attachment "config-4.20.0-rc1-00053-gbe11360" of type "text/plain" (168490 bytes)

View attachment "job-script" of type "text/plain" (4339 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (14316 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ