lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CA+G9fYvB5KmpJmwu+gkM4UiWFTwFVuRFZvAj7Kojw0o-raCezA@mail.gmail.com>
Date:   Mon, 4 Jul 2022 15:51:44 +0530
From:   Naresh Kamboju <naresh.kamboju@...aro.org>
To:     open list <linux-kernel@...r.kernel.org>,
        LTP List <ltp@...ts.linux.it>, regressions@...ts.linux.dev,
        lkft-triage@...ts.linaro.org
Cc:     Andy Lutomirski <luto@...capital.net>,
        Thomas Gleixner <tglx@...utronix.de>,
        Peter Zijlstra <peterz@...radead.org>
Subject: 5.19.0-rc5: qemu-i386: traps: PANIC: double fault, error_code: 0x0

Following kernel crash noticed on qemu-i386 while running LTP cve tests

Reported-by: Linux Kernel Functional Testing <lkft@...aro.org>

metadata:
  git_ref: master
  git_repo: https://gitlab.com/Linaro/lkft/mirrors/torvalds/linux-mainline
  git_sha: 88084a3df1672e131ddc1b4e39eeacfd39864acf
  git_describe: v5.19-rc5
  kernel_version: 5.19.0-rc5
  kernel-config: https://builds.tuxbuild.com/2BSF0Azg4qZOVFsPdPsWOT0KBzM/config
  artifact-location: https://builds.tuxbuild.com/2BSF0Azg4qZOVFsPdPsWOT0KBzM/
  System.map: https://builds.tuxbuild.com/2BSF0Azg4qZOVFsPdPsWOT0KBzM/System.map
  vmlinux.xz: https://builds.tuxbuild.com/2BSF0Azg4qZOVFsPdPsWOT0KBzM/vmlinux.xz

steps to reproduce:
cd /opt/ltp
./runltp -p -q -f cve

cve-2014-0196.c:125: TPASS: Nothing bad happened, probably.

Summary:
passed   1
failed   0
broken   0
skipped  0
warnings 0
gethostbyname_r01    1  TPASS  :  not vulnerable
tst_test.c:1433: TINFO: Timeout per run is 0h 15m 00s
<47>[  916.714682] systemd-journald[195]: Sent WATCHDOG=1 notification.
<47>[  916.915653] systemd-journald[195]: Successfully sent stream
file descriptor to service manager.
<0>[  920.086226] traps: PANIC: double fault, error_code: 0x0
<4>[  920.087343] double fault: 0000 [#1] PREEMPT SMP
<4>[  920.087914] CPU: 1 PID: 15074 Comm: keyctl02 Not tainted 5.19.0-rc5 #1
<4>[  920.088131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009),
BIOS 1.14.0-2 04/01/2014
<4>[  920.088484] EIP: atomic64_add_return_cx8+0x21/0x2c
<4>[  920.088700] Code: 90 f0 0f c7 0e 75 fa c3 90 55 53 56 57 89 c6
89 d7 89 cd 89 d8 89 ca f0 0f c7 09 89 c3 89 d1 01 f3 11 f9 f0 0f c7
4d 00 75 f1 <89> d8 89 ca 5f 5e 5b 5d c3 90 90 55 53 56 57 89 c6 89 d7
89 cd 89
<4>[  920.088700] EAX: 00000011 EBX: 00000010 ECX: 00000000 EDX: 00000000
<4>[  920.088700] ESI: ffffffff EDI: ffffffff EBP: c1df3bb0 ESP: c3479eb0
<4>[  920.088700] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: ffffffff
<4>[  920.088700] CR0: 80050033 CR2: 01f17320 CR3: 0a126000 CR4: 000006d0
<4>[  920.088700] Call Trace:
<4>[  920.088700]  ? pids_release+0x32/0x50
<4>[  920.088700]  ? cgroup_release+0x41/0xe0
<4>[  920.088700]  ? release_task+0x61/0x640
<4>[  920.088700]  ? trace_preempt_on+0x28/0x30
<4>[  920.088700]  ? _raw_write_unlock_irq+0x1b/0x30
<4>[  920.088700]  ? preempt_count_sub+0x7a/0xe0
<4>[  920.088700]  ? do_exit+0x50a/0x910
<4>[  920.088700]  ? syscall_enter_from_user_mode_work+0x135/0x150
<4>[  920.088700]  ? __ia32_sys_exit+0x15/0x20
<4>[  920.088700]  ? __do_fast_syscall_32+0x86/0xd0
<4>[  920.088700]  ? __this_cpu_preempt_check+0xf/0x11
<4>[  920.088700]  ? fpregs_restore_userregs+0x71/0xf0
<4>[  920.088700]  ? syscall_exit_to_user_mode+0x3c/0x60
<4>[  920.088700]  ? ret_from_fork+0x10/0x28
<4>[  920.088700]  ? do_fast_syscall_32+0x29/0x60
<4>[  920.088700]  ? do_SYSENTER_32+0x12/0x20
<4>[  920.088700]  ? entry_SYSENTER_32+0x98/0xf1
<4>[  920.088700] Modules linked in:
<4>[  920.088700] ---[ end trace 0000000000000000 ]---
<4>[  920.088700] EIP: atomic64_add_return_cx8+0x21/0x2c
<4>[  920.088700] Code: 90 f0 0f c7 0e 75 fa c3 90 55 53 56 57 89 c6
89 d7 89 cd 89 d8 89 ca f0 0f c7 09 89 c3 89 d1 01 f3 11 f9 f0 0f c7
4d 00 75 f1 <89> d8 89 ca 5f 5e 5b 5d c3 90 90 55 53 56 57 89 c6 89 d7
89 cd 89
<4>[  920.088700] EAX: 00000011 EBX: 00000010 ECX: 00000000 EDX: 00000000
<4>[  920.088700] ESI: ffffffff EDI: ffffffff EBP: c1df3bb0 ESP: c3479eb0
<4>[  920.088700] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: ffffffff
<4>[  920.088700] CR0: 80050033 CR2: 01f17320 CR3: 0a126000 CR4: 000006d0
<0>[  920.088700] Kernel panic - not syncing: Fatal exception in interrupt
<0>[  920.088700] Kernel Offset: disabled

links,
https://qa-reports.linaro.org/lkft/linux-mainline-master/build/v5.19-rc5/testrun/10489457/suite/log-parser-test/tests/


--
Linaro LKFT
https://lkft.linaro.org

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ