lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Thu, 16 Jul 2020 16:37:42 +0800
From:   kernel test robot <rong.a.chen@...el.com>
To:     ira.weiny@...el.com
Cc:     Thomas Gleixner <tglx@...utronix.de>,
        Ingo Molnar <mingo@...hat.com>, Borislav Petkov <bp@...en8.de>,
        Andy Lutomirski <luto@...nel.org>,
        Peter Zijlstra <peterz@...radead.org>,
        Ira Weiny <ira.weiny@...el.com>,
        Fenghua Yu <fenghua.yu@...el.com>, x86@...nel.org,
        Dave Hansen <dave.hansen@...ux.intel.com>,
        Dan Williams <dan.j.williams@...el.com>,
        Vishal Verma <vishal.l.verma@...el.com>,
        Andrew Morton <akpm@...ux-foundation.org>,
        linux-doc@...r.kernel.org, linux-kernel@...r.kernel.org,
        linux-nvdimm@...ts.01.org, linux-fsdevel@...r.kernel.org,
        linux-mm@...ck.org, linux-kselftest@...r.kernel.org,
        lkp@...ts.01.org
Subject: [x86/pks] 061e3e0b92:
 leaking-addresses.dmesg.uncheckedMSRaccesserror:WRMSRto0x6e1(triedtowrite0x0000000055555554)atrIP:(write_pkrs+0x15/0x2b)

Greeting,

FYI, we noticed the following commit (built with gcc-9):

commit: 061e3e0b92e26642bf69bf520767adecec855b6f ("[RFC PATCH 04/15] x86/pks: Preserve the PKRS MSR on context switch")
url: https://github.com/0day-ci/linux/commits/ira-weiny-intel-com/PKS-Add-Protection-Keys-Supervisor-PKS-support/20200714-151030
base: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git 0dc589da873b58b70f4caf4b070fb0cf70fdd1dc

in testcase: leaking-addresses
with following parameters:

	ucode: 0x21



on test machine: 8 threads Intel(R) Core(TM) i7-3770K CPU @ 3.50GHz with 16G memory

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):



If you fix the issue, kindly add following tag
Reported-by: kernel test robot <rong.a.chen@...el.com>



2020-07-15 05:21:03 ./leaking_addresses.pl --output-raw result/scan.out
2020-07-15 05:21:29 ./leaking_addresses.pl --input-raw result/scan.out --squash-by-filename

Total number of results from scan (incl dmesg): 150520

dmesg output:
[    0.027642] mapped APIC to ffffffffff5fc000 (        fee00000)
[    0.039863] mapped IOAPIC to ffffffffff5fb000 (fec00000)
[    7.259462] unchecked MSR access error: WRMSR to 0x6e1 (tried to write 0x0000000055555554) at rIP: 0xffffffff810743d5 (write_pkrs+0x15/0x2b)
[    7.905588] RSP: 0018:ffffffff82603e58 EFLAGS: 00000202
[    7.905589] RAX: ffff88841f22b1c0 RBX: ffff88841f236100 RCX: 000000000000001f
[    7.905590] RBP: ffffffff82763a80 R08: 00000001d734dad2 R09: 000000007fffffff
[    7.905591] R10: 0000000000000001 R11: ffff88841f22a324 R12: 00000001d734dad2
[    7.905591] R13: 0000000000000004 R14: 0000000000000004 R15: ffffffff82612840


To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp install job.yaml  # job file is attached in this email
        bin/lkp run     job.yaml



Thanks,
Rong Chen


View attachment "config-5.8.0-rc5-00012-g061e3e0b92e26" of type "text/plain" (158387 bytes)

View attachment "job-script" of type "text/plain" (5244 bytes)

Download attachment "kmsg.xz" of type "application/x-xz" (21312 bytes)

View attachment "leaking-addresses" of type "text/plain" (3342 bytes)

View attachment "job.yaml" of type "text/plain" (4145 bytes)

View attachment "reproduce" of type "text/plain" (125 bytes)

Powered by blists - more mailing lists