lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Mon, 24 Dec 2018 02:35:08 +0800
From:   kernel test robot <lkp@...el.com>
To:     "Eric W. Biederman" <ebiederm@...ssion.com>
Cc:     LKML <linux-kernel@...r.kernel.org>,
        containers@...ts.linux-foundation.org,
        "Eric W. Biederman" <ebiederm@...ssion.com>, lkp@...org
Subject: [vfs]  cbc815d9ce: BUG:unable_to_handle_kernel


FYI, we noticed the following commit (built with gcc-6):

commit: cbc815d9ce7ae30677c929e94b2e176d5f4a5a36 ("vfs: Simplify security mount option processing")
https://git.kernel.org/cgit/linux/kernel/git/ebiederm/user-namespace.git mount-cleanups-testing

in testcase: trinity
with following parameters:

	runtime: 300s

test-description: Trinity is a linux system call fuzz tester.
test-url: http://codemonkey.org.uk/projects/trinity/


on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 768M

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):


+------------------------------------------+------------+------------+
|                                          | e06ef473d1 | cbc815d9ce |
+------------------------------------------+------------+------------+
| boot_successes                           | 4          | 0          |
| boot_failures                            | 0          | 4          |
| BUG:unable_to_handle_kernel              | 0          | 4          |
| Oops:#[##]                               | 0          | 4          |
| RIP:join_options                         | 0          | 4          |
| Kernel_panic-not_syncing:Fatal_exception | 0          | 4          |
+------------------------------------------+------------+------------+



[    2.150318] BUG: unable to handle kernel NULL pointer dereference at 0000000000000010
[    2.153661] PGD 0 P4D 0 
[    2.153661] Oops: 0002 [#1] PTI
[    2.153661] CPU: 0 PID: 0 Comm: swapper Not tainted 4.20.0-rc1-00054-gcbc815d #1
[    2.153661] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014
[    2.153661] RIP: 0010:join_options+0x7c/0x85
[    2.153661] Code: f6 74 27 4c 89 c9 48 89 f7 f2 ae 48 f7 d1 48 ff c9 4c 39 c2 74 06 c6 02 2c 48 ff c2 48 89 d7 48 83 c3 08 f3 a4 48 89 fa eb d1 <c6> 02 00 4c 89 c0 5b 5d c3 31 c0 48 39 b7 f8 05 00 00 55 48 89 e5
[    2.153661] RSP: 0000:ffffffff81e03da8 EFLAGS: 00010246
[    2.153661] RAX: 0000000000000000 RBX: ffff88000002fae8 RCX: 0000000000000000
[    2.153661] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000000
[    2.153661] RBP: ffffffff81e03db0 R08: 0000000000000010 R09: ffffffffffffffff
[    2.153661] R10: ffffffff81e03dc0 R11: 0000000000000000 R12: 0000000000000000
[    2.153661] R13: 0000000000000000 R14: ffffffff81e03e08 R15: 0000000000000000
[    2.153661] FS:  0000000000000000(0000) GS:ffffffff81e38000(0000) knlGS:0000000000000000
[    2.153661] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    2.153661] CR2: 0000000000000010 CR3: 0000000001e1a000 CR4: 00000000000006b0
[    2.153661] Call Trace:
[    2.153661]  security_parse_options+0x4d/0x9e
[    2.153661]  mount_fs+0x4e/0xad
[    2.153661]  vfs_kern_mount+0x63/0x147
[    2.153661]  mnt_init+0x1b2/0x25d
[    2.153661]  vfs_caches_init+0x7d/0xa8
[    2.153661]  start_kernel+0x5b3/0x63e
[    2.153661]  x86_64_start_reservations+0x88/0xa9
[    2.153661]  x86_64_start_kernel+0x78/0x9b
[    2.153661]  secondary_startup_64+0xa4/0xb0
[    2.153661] Modules linked in:
[    2.153661] CR2: 0000000000000010
[    2.153661] random: get_random_bytes called from init_oops_id+0x21/0x32 with crng_init=0
[    2.153661] ---[ end trace b408251ec522a787 ]---


To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> job-script # job-script is attached in this email



Thanks,
lkp

View attachment "config-4.20.0-rc1-00054-gcbc815d" of type "text/plain" (105086 bytes)

View attachment "job-script" of type "text/plain" (4285 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (4604 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ