[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <202303222245.c0b1af97-oliver.sang@intel.com>
Date: Wed, 22 Mar 2023 23:30:32 +0800
From: kernel test robot <oliver.sang@...el.com>
To: Casey Schaufler <casey@...aufler-ca.com>
CC: <oe-lkp@...ts.linux.dev>, <lkp@...el.com>,
<linux-kernel@...r.kernel.org>,
<linux-security-module@...r.kernel.org>, <casey@...aufler-ca.com>,
<paul@...l-moore.com>, <jmorris@...ei.org>,
<keescook@...omium.org>, <john.johansen@...onical.com>,
<penguin-kernel@...ove.sakura.ne.jp>,
<stephen.smalley.work@...il.com>, <linux-api@...r.kernel.org>,
<mic@...ikod.net>
Subject: Re: [PATCH v7 02/11] LSM: Maintain a table of LSM attribute data
Greeting,
FYI, we noticed WARNING:at_security/security.c:#append_ordered_lsm due to commit (built with gcc-11):
commit: c7e8233da73a24636e9c1d2a7114ebc9da924fe0 ("[PATCH v7 02/11] LSM: Maintain a table of LSM attribute data")
url: https://github.com/intel-lab-lkp/linux/commits/Casey-Schaufler/LSM-Maintain-a-table-of-LSM-attribute-data/20230316-074751
base: https://git.kernel.org/cgit/linux/kernel/git/shuah/linux-kselftest.git next
patch link: https://lore.kernel.org/all/20230315224704.2672-3-casey@schaufler-ca.com/
patch subject: [PATCH v7 02/11] LSM: Maintain a table of LSM attribute data
in testcase: trinity
version: trinity-static-i386-x86_64-1c734c75-1_2020-01-06
with following parameters:
runtime: 300s
group: group-02
test-description: Trinity is a linux system call fuzz tester.
test-url: http://codemonkey.org.uk/projects/trinity/
on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G
caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):
If you fix the issue, kindly add following tag
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Link: https://lore.kernel.org/oe-lkp/202303222245.c0b1af97-oliver.sang@intel.com
[ 1.821776][ T0] ------------[ cut here ]------------
[ 1.822708][ T0] builtin: out of LSM slots!?
[ 1.823230][ T0] WARNING: CPU: 0 PID: 0 at security/security.c:173 append_ordered_lsm (security.c:?)
[ 1.823709][ T0] Modules linked in:
[ 1.824708][ T0] CPU: 0 PID: 0 Comm: swapper Not tainted 6.3.0-rc1-00003-gc7e8233da73a #1
[ 1.825708][ T0] EIP: append_ordered_lsm (security.c:?)
[ 1.826307][ T0] Code: c3 55 89 e5 57 89 d7 56 53 89 c3 e8 7b ff ff ff 84 c0 75 7a 8b 35 7c 99 12 c3 83 fe 01 75 11 57 68 3e e7 7c c2 e8 b4 a6 f4 fd <0f> 0b 58 5a eb 5e 83 7b 0c 00 75 07 c7 43 0c 84 99 12 c3 8d 46 01
All code
========
0: c3 retq
1: 55 push %rbp
2: 89 e5 mov %esp,%ebp
4: 57 push %rdi
5: 89 d7 mov %edx,%edi
7: 56 push %rsi
8: 53 push %rbx
9: 89 c3 mov %eax,%ebx
b: e8 7b ff ff ff callq 0xffffffffffffff8b
10: 84 c0 test %al,%al
12: 75 7a jne 0x8e
14: 8b 35 7c 99 12 c3 mov -0x3ced6684(%rip),%esi # 0xffffffffc3129996
1a: 83 fe 01 cmp $0x1,%esi
1d: 75 11 jne 0x30
1f: 57 push %rdi
20: 68 3e e7 7c c2 pushq $0xffffffffc27ce73e
25: e8 b4 a6 f4 fd callq 0xfffffffffdf4a6de
2a:* 0f 0b ud2 <-- trapping instruction
2c: 58 pop %rax
2d: 5a pop %rdx
2e: eb 5e jmp 0x8e
30: 83 7b 0c 00 cmpl $0x0,0xc(%rbx)
34: 75 07 jne 0x3d
36: c7 43 0c 84 99 12 c3 movl $0xc3129984,0xc(%rbx)
3d: 8d 46 01 lea 0x1(%rsi),%eax
Code starting with the faulting instruction
===========================================
0: 0f 0b ud2
2: 58 pop %rax
3: 5a pop %rdx
4: eb 5e jmp 0x64
6: 83 7b 0c 00 cmpl $0x0,0xc(%rbx)
a: 75 07 jne 0x13
c: c7 43 0c 84 99 12 c3 movl $0xc3129984,0xc(%rbx)
13: 8d 46 01 lea 0x1(%rsi),%eax
[ 1.826710][ T0] EAX: 00000000 EBX: c313d090 ECX: 00000000 EDX: 00000000
[ 1.827500][ T0] ESI: 00000001 EDI: c27ce8d5 EBP: c29b7f44 ESP: c29b7f30
[ 1.827709][ T0] DS: 007b ES: 007b FS: 0000 GS: 0000 SS: 0068 EFLAGS: 00210246
[ 1.828712][ T0] CR0: 80050033 CR2: ffd99000 CR3: 0314f000 CR4: 00040690
[ 1.829710][ T0] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 1.830708][ T0] DR6: fffe0ff0 DR7: 00000400
[ 1.831708][ T0] Call Trace:
[ 1.832104][ T0] ordered_lsm_parse (security.c:?)
[ 1.832712][ T0] ordered_lsm_init (security.c:?)
[ 1.833264][ T0] security_init (??:?)
[ 1.833710][ T0] start_kernel (??:?)
[ 1.834247][ T0] i386_start_kernel (??:?)
[ 1.834709][ T0] startup_32_smp (??:?)
[ 1.835279][ T0] irq event stamp: 1363
[ 1.835709][ T0] hardirqs last enabled at (1373): __up_console_sem (printk.c:?)
[ 1.836709][ T0] hardirqs last disabled at (1382): __up_console_sem (printk.c:?)
[ 1.837708][ T0] softirqs last enabled at (0): 0x0
[ 1.838708][ T0] softirqs last disabled at (0): 0x0
[ 1.839708][ T0] ---[ end trace 0000000000000000 ]---
[ 1.840359][ T0] LSM: initializing lsm=capability
To reproduce:
# build kernel
cd linux
cp config-6.3.0-rc1-00003-gc7e8233da73a .config
make HOSTCC=gcc-11 CC=gcc-11 ARCH=i386 olddefconfig prepare modules_prepare bzImage modules
make HOSTCC=gcc-11 CC=gcc-11 ARCH=i386 INSTALL_MOD_PATH=<mod-install-dir> modules_install
cd <mod-install-dir>
find lib/ | cpio -o -H newc --quiet | gzip > modules.cgz
git clone https://github.com/intel/lkp-tests.git
cd lkp-tests
bin/lkp qemu -k <bzImage> -m modules.cgz job-script # job-script is attached in this email
# if come across any failure that blocks the test,
# please remove ~/.lkp and /lkp dir to run from a clean state.
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests
View attachment "config-6.3.0-rc1-00003-gc7e8233da73a" of type "text/plain" (143457 bytes)
View attachment "job-script" of type "text/plain" (4772 bytes)
Download attachment "dmesg.xz" of type "application/x-xz" (52756 bytes)
View attachment "trinity" of type "text/plain" (6143 bytes)
Powered by blists - more mailing lists