lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 25 Nov 2021 22:26:22 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Johannes Berg <johannes.berg@...el.com>
Cc:     Linus Torvalds <torvalds@...ux-foundation.org>,
        Nick Desaulniers <ndesaulniers@...gle.com>,
        Peter Oberparleiter <oberpar@...ux.ibm.com>,
        Andrew Morton <akpm@...ux-foundation.org>,
        LKML <linux-kernel@...r.kernel.org>, lkp@...ts.01.org,
        lkp@...el.com
Subject: [gcov]  1391efa952: BUG:KASAN:slab-out-of-bounds_in_gcov_info_add



Greeting,

FYI, we noticed the following commit (built with clang-14):

commit: 1391efa952e8b22088f8626fc63ade26767b92d6 ("gcov: use kvmalloc()")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master

in testcase: boot

on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):



If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>


[ 119.538115][ T207] BUG: KASAN: slab-out-of-bounds in gcov_info_add (kernel/gcov/clang.c:328) 
[  119.539782][  T207] Read of size 8 at addr ffff88810a985328 by task systemd-udevd/207
[  119.541504][  T207]
[  119.542060][  T207] CPU: 1 PID: 207 Comm: systemd-udevd Not tainted 5.12.0-11517-g1391efa952e8 #2
[  119.544625][  T207] Call Trace:
[ 119.544673][ T207] dump_stack (lib/dump_stack.c:79 lib/dump_stack.c:120) 
[ 119.546417][ T207] ? gcov_info_add (kernel/gcov/clang.c:328) 
[ 119.547527][ T207] print_address_description (mm/kasan/report.c:234) 
[ 119.548808][ T207] ? _raw_spin_lock_irqsave (kernel/locking/spinlock.c:159) 
0m] Listening on[ 119.552074][ T207] kasan_report (mm/kasan/report.c:420 mm/kasan/report.c:436) 
D-Bus [ 119.553265][ T207] ? gcov_info_add (kernel/gcov/clang.c:328) 
System Message B[ 119.554491][ T207] __asan_report_load8_noabort (mm/kasan/report_generic.c:309) 
us Socket.[ 119.555899][ T207] gcov_info_add (kernel/gcov/clang.c:328) 

[ 119.557116][ T207] gcov_event (kernel/gcov/fs.c:794) 
[ 119.558212][ T207] gcov_module_notifier (kernel/gcov/base.c:120) 
[ 119.559371][ T207] notifier_call_chain (kernel/notifier.c:83) 
[ 119.560600][ T207] blocking_notifier_call_chain (kernel/notifier.c:337) 
[ 119.560664][ T207] do_init_module (kernel/module.c:3750) 
[ 119.562888][ T207] load_module (kernel/module.c:4060) 
[ 119.563941][ T207] ? init_wait_entry (kernel/sched/wait.c:403) 
0m] Reached targ[ 119.566476][ T207] do_syscall_64 (arch/x86/entry/common.c:47) 
et Sock[ 119.567629][ T207] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:112) 
ets.[  119.569056][  T207] RIP: 0033:0x7fc466b18f59
[ 119.570136][ T207] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 07 6f 0c 00 f7 d8 64 89 01 48
All code
========
   0:	00 c3                	add    %al,%bl
   2:	66 2e 0f 1f 84 00 00 	nopw   %cs:0x0(%rax,%rax,1)
   9:	00 00 00 
   c:	0f 1f 44 00 00       	nopl   0x0(%rax,%rax,1)
  11:	48 89 f8             	mov    %rdi,%rax
  14:	48 89 f7             	mov    %rsi,%rdi
  17:	48 89 d6             	mov    %rdx,%rsi
  1a:	48 89 ca             	mov    %rcx,%rdx
  1d:	4d 89 c2             	mov    %r8,%r10
  20:	4d 89 c8             	mov    %r9,%r8
  23:	4c 8b 4c 24 08       	mov    0x8(%rsp),%r9
  28:	0f 05                	syscall 
  2a:*	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax		<-- trapping instruction
  30:	73 01                	jae    0x33
  32:	c3                   	retq   
  33:	48 8b 0d 07 6f 0c 00 	mov    0xc6f07(%rip),%rcx        # 0xc6f41
  3a:	f7 d8                	neg    %eax
  3c:	64 89 01             	mov    %eax,%fs:(%rcx)
  3f:	48                   	rex.W

Code starting with the faulting instruction
===========================================
   0:	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax
   6:	73 01                	jae    0x9
   8:	c3                   	retq   
   9:	48 8b 0d 07 6f 0c 00 	mov    0xc6f07(%rip),%rcx        # 0xc6f17
  10:	f7 d8                	neg    %eax
  12:	64 89 01             	mov    %eax,%fs:(%rcx)
  15:	48                   	rex.W

[  119.574787][  T207] RSP: 002b:00007ffe0dd0f608 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
[  119.576607][  T207] RAX: ffffffffffffffda RBX: 000055766851e850 RCX: 00007fc466b18f59
[  119.578303][  T207] RDX: 0000000000000000 RSI: 00007fc466a1dcad RDI: 000000000000000f
[  119.580018][  T207] RBP: 00007fc466a1dcad R08: 0000000000000000 R09: 0000000000000000
[  119.581712][  T207] R10: 000000000000000f R11: 0000000000000246 R12: 0000000000000000
[  119.583416][  T207] R13: 0000557668514ce0 R14: 0000000000020000 R15: 000055766851e850
[  119.585244][  T207]
[  119.585788][  T207] Allocated by task 195:
[ 119.586780][ T207] ____kasan_kmalloc (mm/kasan/common.c:39 mm/kasan/common.c:46 mm/kasan/common.c:428 mm/kasan/common.c:507) 
[ 119.587889][ T207] __kasan_kmalloc (mm/kasan/common.c:516) 
[ 119.588931][ T207] __kmalloc (include/linux/kasan.h:246) 
[ 119.588961][ T207] kvmalloc_node (mm/util.c:593) 
[ 119.588989][ T207] gcov_info_dup (include/linux/mm.h:804 kernel/gcov/clang.c:371 kernel/gcov/clang.c:404) 
[ 119.589017][ T207] gcov_event (kernel/gcov/fs.c:796 kernel/gcov/fs.c:820 kernel/gcov/fs.c:853) 
[ 119.596780][ T207] gcov_module_notifier (kernel/gcov/base.c:120) 
1;39mDaily apt d[ 119.600624][ T207] do_init_module (kernel/module.c:3750) 
ownload activiti[ 119.601829][ T207] load_module (kernel/module.c:4060) 
es.[ 119.603037][ T207] __x64_sys_finit_module (kernel/module.c:4151 kernel/module.c:4128 kernel/module.c:4128) 
[ 119.604319][ T207] do_syscall_64 (arch/x86/entry/common.c:47) 
[ 119.605277][ T207] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:112) 
[  119.606539][  T207]
[  119.609202][  T207] The buggy address belongs to the object at ffff88810a985320
[  119.609202][  T207]  which belongs to the cache kmalloc-8 of size 8
[  119.612113][  T207] The buggy address is located 0 bytes to the right of
[  119.612113][  T207]  8-byte region [ffff88810a985320, ffff88810a985328)

[  119.615017][  T207] The buggy address belongs to the page:
[  119.616320][  T207] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10a985
[  119.618522][  T207] flags: 0x8000000000000200(slab|zone=2)
[  119.619804][  T207] raw: 8000000000000200 ffffea00042afec0 0000000300000003 ffff888100041280
[  119.619832][  T207] raw: 0000000000000000 0000000000660066 00000001ffffffff 0000000000000000
[  119.619853][  T207] page dumped because: kasan: bad access detected
[  119.619926][  T207] page_owner tracks the page as allocated
[  119.625991][  T207] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 1, ts 34574012785, free_ts 0
1;39mDaily rotat[ 119.631773][ T207] __alloc_pages (mm/page_alloc.c:5201) 
ion of log files[ 119.632961][ T207] new_slab (mm/slub.c:344 mm/slub.c:1784 mm/slub.c:1847) 
.[ 119.634055][ T207] ___slab_alloc (mm/slub.c:2594 mm/slub.c:2756) 
[ 119.635185][ T207] __slab_alloc (mm/slub.c:2796) 
[ 119.636168][ T207] __kmalloc (mm/slub.c:2878 mm/slub.c:2920 mm/slub.c:4063) 

[ 119.637106][ T207] acpi_ns_internalize_name (drivers/acpi/acpica/nsutils.c:332) 
[ 119.638379][ T207] acpi_ns_get_node_unlocked (drivers/acpi/acpica/nsutils.c:667) 
[ 119.641517][ T207] acpi_ns_get_node (drivers/acpi/acpica/nsutils.c:726) 
[ 119.642568][ T207] acpi_get_handle (drivers/acpi/acpica/nsxfname.c:99) 
[ 119.643648][ T207] acpi_has_method (drivers/acpi/utils.c:539) 
[ 119.644724][ T207] acpi_is_video_device (drivers/acpi/scan.c:1212) 
[ 119.645877][ T207] acpi_init_device_object (drivers/acpi/scan.c:1352 drivers/acpi/scan.c:1662) 
[ 119.645908][ T207] acpi_add_single_object (drivers/acpi/scan.c:1705) 
[ 119.645936][ T207] acpi_bus_check_add (drivers/acpi/scan.c:1951) 
[  119.645968][  T207] page_owner free stack trace missing
[  119.650485][  T207]
1;39mDaily apt u[  119.654379][  T207]  ffff88810a985280: 00 fc fc fc fc 00 fc fc fc fc 00 fc fc fc fc 00
pgrade and clean[  119.656297][  T207] >ffff88810a985300: fc fc fc fc 00 fc fc fc fc 00 fc fc fc fc 00 fc
activities.[  119.658193][  T207]                                   ^
[  119.659563][  T207]  ffff88810a985380: fc fc fc 00 fc fc fc fc 00 fc fc fc fc 00 fc fc

[  119.661299][  T207]  ffff88810a985400: fc fc 00 fc fc fc fc 00 fc fc fc fc 00 fc fc fc
[  119.663111][  T207] ==================================================================
[  119.664832][  T207] Disabling lock debugging due to kernel taint
[  OK  ] Reached target Timers.
[  OK  ] Reached target Basic System.
[  OK  ] Started Regular background program processing daemon.
[  OK  ] Started D-Bus System Message Bus.
Starting LSB: OpenIPMI Driver init script...
Starting System Logging Service...
[  120.038787][    C0] random: fast init done
Starting Login Service...
[  120.181505][  T238] _warn_unseeded_randomness: 80 callbacks suppressed
[ 120.181528][ T238] random: get_random_u64 called from arch_pick_mmap_layout+0x178/0x550 with crng_init=1 
[ 120.181573][ T238] random: get_random_u64 called from randomize_stack_top+0x56/0xb0 with crng_init=1 
[ 120.181786][ T238] random: get_random_u64 called from arch_mmap_rnd+0x80/0x120 with crng_init=1 
Starting Helper to synchronize boot up for ifupdown...
[  OK  ] Started Helper to synchronize boot up for ifupdown.
[  OK  ] Started Login Service.
Starting LSB: Load kernel image with kexec...
Starting Raise network interfaces...
[  OK  ] Started LSB: Load kernel image with kexec.
[  121.015633][  T258] ipmi_si: IPMI System Interface driver
[  121.024502][  T258] ipmi_si: Unable to find any System Interface(s)
[  OK  ] Started Raise network interfaces.
[  OK  ] Reached target Network.
Starting LKP bootstrap...
[  121.191889][  T272] _warn_unseeded_randomness: 195 callbacks suppressed
[ 121.191917][ T272] random: get_random_bytes called from key_alloc+0x9c8/0x10a0 with crng_init=1 
[ 121.196979][ T273] random: get_random_u64 called from arch_pick_mmap_layout+0x178/0x550 with crng_init=1 
[ 121.197012][ T273] random: get_random_u64 called from randomize_stack_top+0x56/0xb0 with crng_init=1 
Starting Permit User Sessions...
Starting OpenBSD Secure Shell server...
Starting /etc/rc.local Compatibility...
[FAILED] Failed to start LSB: OpenIPMI Driver init script.
See 'systemctl status openipmi.service' for details.
[  OK  ] Started Permit User Sessions.
[  OK  ] Started LKP bootstrap.
[  122.253005][  T301] _warn_unseeded_randomness: 176 callbacks suppressed


To reproduce:

        # build kernel
	cd linux
	cp config-5.12.0-11517-g1391efa952e8 .config
	make HOSTCC=clang-14 CC=clang-14 ARCH=x86_64 olddefconfig prepare modules_prepare bzImage

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> job-script # job-script is attached in this email

        # if come across any failure that blocks the test,
        # please remove ~/.lkp and /lkp dir to run from a clean state.



---
0DAY/LKP+ Test Infrastructure                   Open Source Technology Center
https://lists.01.org/hyperkitty/list/lkp@lists.01.org       Intel Corporation

Thanks,
Oliver Sang


View attachment "config-5.12.0-11517-g1391efa952e8" of type "text/plain" (149753 bytes)

View attachment "job-script" of type "text/plain" (4883 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (16716 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ