lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Wed, 14 Dec 2022 10:20:30 +0800
From:   kernel test robot <yujie.liu@...el.com>
To:     Daniel Axtens <dja@...ens.net>
CC:     <oe-lkp@...ts.linux.dev>, <lkp@...el.com>,
        Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
        Andrew Morton <akpm@...ux-foundation.org>,
        David Gow <davidgow@...gle.com>,
        Dmitry Vyukov <dvyukov@...gle.com>,
        "Daniel Micay" <danielmicay@...il.com>,
        Andrey Ryabinin <aryabinin@...tuozzo.com>,
        Alexander Potapenko <glider@...gle.com>,
        Linus Torvalds <torvalds@...ux-foundation.org>,
        Sasha Levin <sashal@...nel.org>,
        Ammar Faizi <ammarfaizi2@...weeb.org>,
        GNU/Weeb Mailing List <gwml@...r.gnuweeb.org>,
        <linux-kernel@...r.kernel.org>
Subject: [ammarfaizi2-block:stable/linux-stable-rc/queue/rc-5.4] [string.h]
 b008ae4cc7: general_protection_fault

Greeting,

FYI, we noticed general_protection_fault:#[##] due to commit (built with gcc-11):

commit: b008ae4cc74d3ab43074099746f6c32d353e01aa ("string.h: fix incompatibility between FORTIFY_SOURCE and KASAN")
https://github.com/ammarfaizi2/linux-block stable/linux-stable-rc/queue/rc-5.4

in testcase: boot

on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):


Starting Load Kernel Modules...
Starting Remount Root and Kernel File Systems...
Starting Coldplug All udev Devices...
[   30.456454][  T204] kasan: CONFIG_KASAN_INLINE enabled
[   30.457639][  T204] kasan: GPF could be caused by NULL-ptr deref or user memory access
[   30.459199][  T204] general protection fault: 0000 [#1] SMP KASAN
[   30.460245][  T204] CPU: 0 PID: 204 Comm: modprobe Not tainted 5.4.47-00158-gb008ae4cc74d3 #1
[   30.461748][  T204] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-4 04/01/2014
[ 30.463402][ T204] RIP: 0010:memcmp (??:?) 
[ 30.464093][ T204] Code: ff df 55 48 89 f5 53 48 89 fb 48 83 ec 08 eb 0d 48 83 c3 01 48 83 c5 01 49 39 dd 74 4b 48 89 d8 48 89 d9 48 c1 e8 03 83 e1 07 <42> 0f b6 04 20 38 c8 7f 04 84 c0 75 53 48 89 e9 48 89 ee 0f b6 03
All code
========
   0:	ff                   	(bad)  
   1:	df 55 48             	fists  0x48(%rbp)
   4:	89 f5                	mov    %esi,%ebp
   6:	53                   	push   %rbx
   7:	48 89 fb             	mov    %rdi,%rbx
   a:	48 83 ec 08          	sub    $0x8,%rsp
   e:	eb 0d                	jmp    0x1d
  10:	48 83 c3 01          	add    $0x1,%rbx
  14:	48 83 c5 01          	add    $0x1,%rbp
  18:	49 39 dd             	cmp    %rbx,%r13
  1b:	74 4b                	je     0x68
  1d:	48 89 d8             	mov    %rbx,%rax
  20:	48 89 d9             	mov    %rbx,%rcx
  23:	48 c1 e8 03          	shr    $0x3,%rax
  27:	83 e1 07             	and    $0x7,%ecx
  2a:*	42 0f b6 04 20       	movzbl (%rax,%r12,1),%eax		<-- trapping instruction
  2f:	38 c8                	cmp    %cl,%al
  31:	7f 04                	jg     0x37
  33:	84 c0                	test   %al,%al
  35:	75 53                	jne    0x8a
  37:	48 89 e9             	mov    %rbp,%rcx
  3a:	48 89 ee             	mov    %rbp,%rsi
  3d:	0f b6 03             	movzbl (%rbx),%eax

Code starting with the faulting instruction
===========================================
   0:	42 0f b6 04 20       	movzbl (%rax,%r12,1),%eax
   5:	38 c8                	cmp    %cl,%al
   7:	7f 04                	jg     0xd
   9:	84 c0                	test   %al,%al
   b:	75 53                	jne    0x60
   d:	48 89 e9             	mov    %rbp,%rcx
  10:	48 89 ee             	mov    %rbp,%rsi
  13:	0f b6 03             	movzbl (%rbx),%eax
[   30.468942][  T204] RSP: 0018:ffff88839c7efae8 EFLAGS: 00010202
[   30.469836][  T204] RAX: 00000000000cbd90 RBX: 000000000065ec81 RCX: 0000000000000001
[   30.471001][  T204] RDX: 0000000000000005 RSI: ffff88839c7efb48 RDI: 000000000065ec81
[   30.472165][  T204] RBP: ffff88839c7efb48 R08: ffff88839c7efb48 R09: 0000000000000000
[   30.473339][  T204] R10: ffffffff855924c7 R11: 0000000000000001 R12: dffffc0000000000
[   30.474525][  T204] R13: 000000000065ec86 R14: 0000000000000000 R15: ffffffff8421e304
[   30.475685][  T204] FS:  00007f49a0d31540(0000) GS:ffff8883a0400000(0000) knlGS:0000000000000000
[   30.476992][  T204] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   30.477947][  T204] CR2: 000055bad2e05e50 CR3: 000000032f16d000 CR4: 00000000000406f0
[   30.479203][  T204] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   30.480538][  T204] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   30.481760][  T204] Call Trace:
[   30.482344][  T204]  __jump_label_set_jump_code+0x1ca/0x2d0
[   30.483211][  T204]  ? __lock_release+0x42c/0x9b0
[   30.483959][  T204]  ? mask_and_ack_8259A.cold+0x6f/0x6f
[   30.484787][  T204]  ? mutex_lock_io_nested+0x1020/0x1020
[   30.485625][  T204]  __jump_label_transform+0x59/0x140
[   30.488747][  T204]  ? get_trap_addr+0x210/0x210
[   30.489500][  T204]  arch_jump_label_transform_static+0xcd/0x115
[   30.490465][  T204]  ? arch_jump_label_transform_apply+0x50/0x50
[   30.491513][  T204]  ? __ww_mutex_check_kill+0x520/0x520
[   30.492472][  T204]  jump_label_apply_nops+0xd9/0x110
[   30.493387][  T204]  module_finalize+0x34e/0x540
[   30.494230][  T204]  load_module+0x1522/0x20c0
[   30.495033][  T204]  __do_sys_finit_module+0x110/0x180
[   30.495937][  T204]  ? __x64_sys_init_module+0xa0/0xa0
[   30.496706][  T204]  ? vm_mmap_pgoff+0x142/0x170
[   30.497439][  T204]  ? trace_hardirqs_on_thunk+0x1a/0x20
[   30.498205][  T204]  ? do_syscall_64+0x23/0x737
[   30.498986][  T204]  do_syscall_64+0xd3/0x737
[   30.499784][  T204]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[   30.500741][  T204] RIP: 0033:0x7f49a0e529b9
[   30.501513][  T204] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d a7 54 0c 00 f7 d8 64 89 01 48
[   30.504513][  T204] RSP: 002b:00007ffedd724b58 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
[   30.505937][  T204] RAX: ffffffffffffffda RBX: 00005644c4b69df0 RCX: 00007f49a0e529b9
[   30.507311][  T204] RDX: 0000000000000000 RSI: 00005644c31c1260 RDI: 0000000000000003
[   30.508668][  T204] RBP: 0000000000060000 R08: 0000000000000000 R09: 00005644c4b6b070
[   30.509720][  T204] R10: 0000000000000003 R11: 0000000000000246 R12: 00005644c31c1260
[   30.511890][  T204] R13: 0000000000000000 R14: 00005644c4b69f20 R15: 00005644c4b69df0
[   30.513035][  T204] Modules linked in:
[   30.513764][  T204] ---[ end trace b968400d252f50e6 ]---
[   30.514724][  T204] RIP: 0010:memcmp+0x43/0xb0
[   30.515500][  T204] Code: ff df 55 48 89 f5 53 48 89 fb 48 83 ec 08 eb 0d 48 83 c3 01 48 83 c5 01 49 39 dd 74 4b 48 89 d8 48 89 d9 48 c1 e8 03 83 e1 07 <42> 0f b6 04 20 38 c8 7f 04 84 c0 75 53 48 89 e9 48 89 ee 0f b6 03
[   30.518439][  T204] RSP: 0018:ffff88839c7efae8 EFLAGS: 00010202
[   30.519453][  T204] RAX: 00000000000cbd90 RBX: 000000000065ec81 RCX: 0000000000000001
[   30.520571][  T204] RDX: 0000000000000005 RSI: ffff88839c7efb48 RDI: 000000000065ec81
[   30.521756][  T204] RBP: ffff88839c7efb48 R08: ffff88839c7efb48 R09: 0000000000000000
[   30.523086][  T204] R10: ffffffff855924c7 R11: 0000000000000001 R12: dffffc0000000000
[   30.524464][  T204] R13: 000000000065ec86 R14: 0000000000000000 R15: ffffffff8421e304
[   30.525743][  T204] FS:  00007f49a0d31540(0000) GS:ffff8883a0400000(0000) knlGS:0000000000000000
[   30.527217][  T204] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   30.528214][  T204] CR2: 000055bad2e05e50 CR3: 000000032f16d000 CR4: 00000000000406f0
[   30.529351][  T204] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   30.530744][  T204] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   30.532155][  T204] Kernel panic - not syncing: Fatal exception
[   30.533150][  T204] Kernel Offset: disabled


If you fix the issue, kindly add following tag
| Reported-by: kernel test robot <yujie.liu@...el.com>
| Link: https://lore.kernel.org/oe-lkp/202212140958.55eeac34-yujie.liu@intel.com


To reproduce:

        # build kernel
	cd linux
	cp config-5.4.47-00158-gb008ae4cc74d3 .config
	make HOSTCC=gcc-11 CC=gcc-11 ARCH=x86_64 olddefconfig prepare modules_prepare bzImage modules
	make HOSTCC=gcc-11 CC=gcc-11 ARCH=x86_64 INSTALL_MOD_PATH=<mod-install-dir> modules_install
	cd <mod-install-dir>
	find lib/ | cpio -o -H newc --quiet | gzip > modules.cgz


        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> -m modules.cgz job-script # job-script is attached in this email

        # if come across any failure that blocks the test,
        # please remove ~/.lkp and /lkp dir to run from a clean state.


-- 
0-DAY CI Kernel Test Service
https://01.org/lkp

View attachment "config-5.4.47-00158-gb008ae4cc74d3" of type "text/plain" (151355 bytes)

View attachment "job-script" of type "text/plain" (4945 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (38808 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ