lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 8 Apr 2019 21:56:10 +0800
From:   kernel test robot <rong.a.chen@...el.com>
To:     "Paul E. McKenney" <paulmck@...ux.ibm.com>
Cc:     Mathieu Desnoyers <mathieu.desnoyers@...icios.com>,
        LKML <linux-kernel@...r.kernel.org>,
        "Paul E. McKenney" <paulmck@...ux.vnet.ibm.com>, lkp@...org
Subject: [srcu] a365bb5f6e: leaking_addresses.proc.___srcu_struct_ptrs.

FYI, we noticed the following commit (built with gcc-7):

commit: a365bb5f6eafb220a1448674054b05c250829313 ("srcu: Allocate per-CPU data for DEFINE_SRCU() in modules")
https://git.kernel.org/cgit/linux/kernel/git/paulmck/linux-rcu.git tmp.2019.04.07a

in testcase: leaking_addresses
with following parameters:




on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 2G

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):


+-------------------------------------------------+------------+------------+
|                                                 | a44a55abae | a365bb5f6e |
+-------------------------------------------------+------------+------------+
| boot_successes                                  | 0          | 3          |
| boot_failures                                   | 4          | 6          |
| BUG:kernel_reboot-without-warning_in_test_stage | 4          | 6          |
| leaking_addresses.proc.___srcu_struct_ptrs.     | 0          | 6          |
+-------------------------------------------------+------------+------------+


[1 .rodata.cst16.POLY] 0xffffffffc0498360
[1 .rodata.cst32.byteshift_table] 0xffffffffc03f50f0
[19 __bug_table] 0xffffffffc02be184
[2 __tracepoints_ptrs] 0xffffffffc02f1cd0
[15 .smp_locks] 0xffffffffc042b2cc
[1 .rodata.cst16.enc] 0xffffffffc0498420
[11 __ksymtab_gpl] 0xffffffffc042b028
[8 __ex_table] 0xffffffffc04f13f4
[1 .init.rodata] 0xffffffffc0316000
[36 .note.gnu.build-id] 0xffffffffc03ed000
[1 .rodata.cst16.dec] 0xffffffffc0498410
[16 .parainstructions] 0xffffffffc03ed940
[8 .text..refcount] 0xffffffffc04e2aaa
[36 .gnu.linkonce.this_module] 0xffffffffc03f12c0
[2 __bpf_raw_tp_map] 0xffffffffc03054a0
[30 .orc_unwind_ip] 0xffffffffc03ee9f9
[8 .altinstr_replacement] 0xffffffffc0497372
[26 .rodata.str1.8] 0xffffffffc03ed1f0
[11 __verbose] 0xffffffffc05c9398
[1 .rodata.cst16.TWOONE] 0xffffffffc0498380
[1 uevent] KEY=402000000 3803078f800d001 feffffdfffefffff fffffffffffffffe
[1 .rodata.cst16.ONE] 0xffffffffc04983e0
[8 .altinstructions] 0xffffffffc0498430
[36 modules] crct10dif_pclmul 16384 1 - Live 0xffffffffc03f4000
[1 ___srcu_struct_ptrs] 0xffffffffc03840d0



To reproduce:

        # build kernel
	cd linux
	cp config-5.1.0-rc1-00098-ga365bb5 .config
	make HOSTCC=gcc-7 CC=gcc-7 ARCH=x86_64 olddefconfig
	make HOSTCC=gcc-7 CC=gcc-7 ARCH=x86_64 prepare
	make HOSTCC=gcc-7 CC=gcc-7 ARCH=x86_64 modules_prepare
	make HOSTCC=gcc-7 CC=gcc-7 ARCH=x86_64 SHELL=/bin/bash
	make HOSTCC=gcc-7 CC=gcc-7 ARCH=x86_64 bzImage


        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> job-script # job-script is attached in this email



Thanks,
Rong Chen


View attachment "config-5.1.0-rc1-00098-ga365bb5" of type "text/plain" (193124 bytes)

View attachment "job-script" of type "text/plain" (4758 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (15176 bytes)

View attachment "leaking_addresses" of type "text/plain" (3232 bytes)

Powered by blists - more mailing lists