lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <eb17f8c6-3967-4a39-aaa3-0252950c9084@linaro.org>
Date: Thu, 4 Jan 2024 03:16:15 -0600
From: Daniel Díaz <daniel.diaz@...aro.org>
To: Greg Kroah-Hartman <gregkh@...uxfoundation.org>, stable@...r.kernel.org
Cc: patches@...ts.linux.dev, linux-kernel@...r.kernel.org,
 torvalds@...ux-foundation.org, akpm@...ux-foundation.org,
 linux@...ck-us.net, shuah@...nel.org, patches@...nelci.org,
 lkft-triage@...ts.linaro.org, pavel@...x.de, jonathanh@...dia.com,
 f.fainelli@...il.com, sudipm.mukherjee@...il.com, srw@...dewatkins.net,
 rwarsow@....de, conor@...nel.org, allen.lkml@...il.com,
 Francis Laniel <flaniel@...ux.microsoft.com>
Subject: Re: [PATCH 5.10 00/75] 5.10.206-rc1 review

Hello!

On 03/01/24 10:54 a. m., Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 5.10.206 release.
> There are 75 patches in this series, all will be posted as a response
> to this one.  If anyone has any issues with these being applied, please
> let me know.
> 
> Responses should be made by Fri, 05 Jan 2024 16:47:49 +0000.
> Anything received after that time might be too late.
> 
> The whole patch series can be found in one patch at:
> 	https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.206-rc1.gz
> or in the git tree and branch at:
> 	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y
> and the diffstat can be found below.
> 
> thanks,
> 
> greg k-h

We're seeing a kernel warning on:
* Juno-r2
* Dragonboard 410c
* i386

that looks like this:

-----8<-----
   ------------[ cut here ]------------
   [  968.182348] WARNING: CPU: 2 PID: 16253 at kernel/module.c:261 module_kallsyms_on_each_symbol+0xaf/0xc0
   [  968.191666] Modules linked in: x86_pkg_temp_thermal fuse ip_tables
   [  968.197876] CPU: 2 PID: 16253 Comm: ftracetest Not tainted 5.10.206-rc1 #1
   [  968.204786] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
   [  968.212208] EIP: module_kallsyms_on_each_symbol+0xaf/0xc0
   [  968.217632] Code: 68 d9 75 a4 31 c0 8d 65 f4 5b 5e 5f 5d c3 8d 74 26 00 90 ba ff ff ff ff b8 38 36 68 d9 e8 e9 61 df 00 85 c0 0f 85 6f ff ff ff  0b e9 68 ff ff ff 8d b4 26 00 00 00 00 8d 76 00 3e 8d 74 26 00
   [  968.236389] EAX: 00000000 EBX: 00000001 ECX: ffffffff EDX: 00000001
   [  968.242700] ESI: c5839d68 EDI: 00025c3b EBP: c5839d54 ESP: c5839d3c
   [  968.249008] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 EFLAGS: 00010246
   [  968.255845] CR0: 80050033 CR2: 010d9b70 CR3: 05b30000 CR4: 003506d0
   [  968.262138] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
   [  968.268413] DR6: fffe0ff0 DR7: 00000400
   [  968.272278] Call Trace:
   [  968.274817]  ? show_regs.cold+0x14/0x1a
   [  968.278679]  ? __warn+0x71/0x100
   [  968.281954]  ? module_kallsyms_on_each_symbol+0xaf/0xc0
   [  968.287224]  ? report_bug+0x7e/0xa0
   [  968.290736]  ? exc_overflow+0x40/0x40
   [  968.294452]  ? handle_bug+0x2a/0x50
   [  968.297971]  ? exc_invalid_op+0x1b/0x60
   [  968.301836]  ? handle_exception+0x140/0x140
   [  968.306052]  ? module_kallsyms_on_each_symbol+0xaf/0xc0
   [  968.311310]  ? exc_overflow+0x40/0x40
   [  968.314999]  ? module_kallsyms_on_each_symbol+0xaf/0xc0
   [  968.320252]  ? trace_kprobe_run_command+0x20/0x20
   [  968.324970]  ? trace_kprobe_run_command+0x20/0x20
   [  968.329720]  kallsyms_on_each_symbol+0xc1/0xd0
   [  968.334195]  ? trace_kprobe_run_command+0x20/0x20
   [  968.338939]  trace_kprobe_create+0x5fd/0xb20
   [  968.343243]  ? alloc_trace_kprobe+0x130/0x130
   [  968.347628]  create_dyn_event+0x57/0xc0
   [  968.351495]  ? dyn_event_release+0x140/0x140
   [  968.355791]  trace_run_command+0x69/0x80
   [  968.359754]  trace_parse_run_command+0x97/0x130
   [  968.364339]  ? dyn_event_seq_next+0x20/0x20
   [  968.368549]  dyn_event_write+0x10/0x20
   [  968.372328]  ? dyn_event_release+0x140/0x140
   [  968.376611]  vfs_write+0xe5/0x500
   [  968.379973]  ? lock_acquire+0x8c/0x230
   [  968.383752]  ? __might_fault+0x31/0x70
   [  968.387545]  ? find_held_lock+0x24/0x80
   [  968.391414]  ksys_write+0x72/0xf0
   [  968.394759]  __ia32_sys_write+0x15/0x20
   [  968.398621]  __do_fast_syscall_32+0x54/0xa0
   [  968.402838]  do_fast_syscall_32+0x29/0x60
   [  968.406868]  do_SYSENTER_32+0x15/0x20
   [  968.410547]  entry_SYSENTER_32+0x9f/0xf2
   [  968.414497] EIP: 0xb7f85549
   [  968.417309] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80  5a 59 c3 90 90 90 90 8d 76 00 58 b8 77 00 00 00 cd 80 90 8d 76
   [  968.436081] EAX: ffffffda EBX: 00000001 ECX: 010ccdc0 EDX: 00000018
   [  968.442371] ESI: b7f6aff4 EDI: 010ccdc0 EBP: 0044c4fc ESP: bfd964c0
   [  968.448664] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000246
   [  968.455478] irq event stamp: 77487
   [  968.458912] hardirqs last  enabled at (77497): [] console_unlock+0x589/0x5a0
   [  968.466837] hardirqs last disabled at (77506): [] console_unlock+0x41d/0x5a0
   [  968.474799] softirqs last  enabled at (77474): [] call_on_stack+0x45/0x50
   [  968.482480] softirqs last disabled at (77469): [] call_on_stack+0x45/0x50
   [  968.490183] ---[ end trace 444b2433ce3c8b30 ]---
----->8-----

and this:

-----8<-----
   ------------[ cut here ]------------
   [  418.955406] WARNING: CPU: 1 PID: 10942 at kernel/module.c:261 module_assert_mutex+0x3c/0x50
   [  418.963777] Modules linked in: tda998x cec drm_kms_helper crct10dif_ce fuse drm dm_mod ip_tables x_tables
   [  418.973433] CPU: 1 PID: 10942 Comm: ftracetest Not tainted 5.10.206-rc1 #1
   [  418.980324] Hardware name: ARM Juno development board (r2) (DT)
   [  418.986261] pstate: 60000005 (nZCv daif -PAN -UAO -TCO BTYPE=--)
   [  418.992284] pc : module_assert_mutex+0x3c/0x50
   [  418.996739] lr : module_assert_mutex+0x38/0x50
   [  419.001192] sp : ffff80001cd03a90
   [  419.004515] x29: ffff80001cd03a90 x28: 0000000000000018
   [  419.009853] x27: 0000000000000002 x26: ffff0008324a6f80
   [  419.015189] x25: 0000000000000006 x24: ffff800012819678
   [  419.020525] x23: ffff0008324a6608 x22: ffff800010229bd0
   [  419.025861] x21: ffff800010229bd0 x20: ffff80001cd03c68
   [  419.031196] x19: 0000000000000000 x18: 0000000000000000
   [  419.036531] x17: 0000000000000000 x16: 0000000000000000
   [  419.041867] x15: 0000aaab20142c50 x14: 0000000000000028
   [  419.047202] x13: 0000000000000002 x12: 0000000000000003
   [  419.052538] x11: 0000000000000002 x10: 0101010101010101
   [  419.057873] x9 : ffff80001019b11c x8 : 7f7f7f7f7f7f7f7f
   [  419.063209] x7 : 625e6b646d71646a x6 : 34001c0a651c383c
   [  419.068544] x5 : 3c381c650a1c0034 x4 : 0000000000000000
   [  419.073880] x3 : 7d95b99001c19d7c x2 : ffff80096cfc9000
   [  419.079215] x1 : 0000000000000000 x0 : 0000000000000000
   [  419.084551] Call trace:
   [  419.087005]  module_assert_mutex+0x3c/0x50
   [  419.091114]  module_kallsyms_on_each_symbol+0x2c/0x100
   [  419.096267]  kallsyms_on_each_symbol+0xe0/0x120
   [  419.100812]  trace_kprobe_create+0x4e4/0x9d0
   [  419.105095]  create_dyn_event+0x80/0xf0
   [  419.108943]  trace_run_command+0x90/0xac
   [  419.112877]  trace_parse_run_command+0x120/0x4c0
   [  419.117506]  dyn_event_write+0x18/0x24
   [  419.121267]  vfs_write+0xec/0x20c
   [  419.124592]  ksys_write+0x78/0x110
   [  419.128004]  __arm64_sys_write+0x24/0x30
   [  419.131939]  el0_svc_common.constprop.0+0x84/0x1e0
   [  419.136743]  do_el0_svc+0x2c/0xa4
   [  419.140069]  el0_svc+0x20/0x30
   [  419.143132]  el0_sync_handler+0xe8/0x114
   [  419.147065]  el0_sync+0x180/0x1c0
   [  419.150387] irq event stamp: 48184
   [  419.153800] hardirqs last  enabled at (48183): [] exit_to_kernel_mode+0x38/0x180
   [  419.162781] hardirqs last disabled at (48184): [] el1_dbg+0x24/0x50
   [  419.170630] softirqs last  enabled at (48168): [] __do_softirq+0x4dc/0x564
   [  419.179091] softirqs last disabled at (48153): [] __irq_exit_rcu+0x170/0x194
   [  419.187721] ---[ end trace 2989cd52be73b559 ]---
   ------------[ cut here ]------------
   [  419.263431] WARNING: CPU: 2 PID: 10942 at kernel/module.c:261 module_assert_mutex+0x3c/0x50
   [  419.271801] Modules linked in: tda998x cec drm_kms_helper crct10dif_ce fuse drm dm_mod ip_tables x_tables
   [  419.281457] CPU: 2 PID: 10942 Comm: ftracetest Tainted: G        W         5.10.206-rc1 #1
   [  419.289740] Hardware name: ARM Juno development board (r2) (DT)
   [  419.295676] pstate: 60000005 (nZCv daif -PAN -UAO -TCO BTYPE=--)
   [  419.301698] pc : module_assert_mutex+0x3c/0x50
   [  419.306154] lr : module_assert_mutex+0x38/0x50
   [  419.310607] sp : ffff80001cd03a90
   [  419.313930] x29: ffff80001cd03a90 x28: 0000000000000018
   [  419.319267] x27: 0000000000000002 x26: ffff000831f8d500
   [  419.324603] x25: 0000000000000007 x24: ffff800012819678
   [  419.329939] x23: ffff000831f8d608 x22: ffff800010229bd0
   [  419.335275] x21: ffff800010229bd0 x20: ffff80001cd03c68
   [  419.340610] x19: 0000000000000000 x18: 0000000000000000
   [  419.345946] x17: 0000000000000000 x16: 0000000000000000
   [  419.351281] x15: 0000aaab20142c50 x14: 000000000003fffd
   [  419.356616] x13: 0000000000000038 x12: 0000000000000038
   [  419.361951] x11: 0000000000000002 x10: 0101010101010101
   [  419.367287] x9 : ffff80001019b11c x8 : 7f7f7f7f7f7f7f7f
   [  419.372622] x7 : 625e6b646d71646a x6 : 34001c0a651c383c
   [  419.377958] x5 : 3c381c650a1c0034 x4 : 0000000000000000
   [  419.383293] x3 : 7d95b99001c19d7c x2 : ffff80096cfeb000
   [  419.388628] x1 : 0000000000000000 x0 : 0000000000000000
   [  419.393964] Call trace:
   [  419.396419]  module_assert_mutex+0x3c/0x50
   [  419.400527]  module_kallsyms_on_each_symbol+0x2c/0x100
   [  419.405679]  kallsyms_on_each_symbol+0xe0/0x120
   [  419.410225]  trace_kprobe_create+0x4e4/0x9d0
   [  419.414507]  create_dyn_event+0x80/0xf0
   [  419.418355]  trace_run_command+0x90/0xac
   [  419.422289]  trace_parse_run_command+0x120/0x4c0
   [  419.426918]  dyn_event_write+0x18/0x24
   [  419.430683]  vfs_write+0xec/0x20c
   [  419.434007]  ksys_write+0x78/0x110
   [  419.437419]  __arm64_sys_write+0x24/0x30
   [  419.441354]  el0_svc_common.constprop.0+0x84/0x1e0
   [  419.446159]  do_el0_svc+0x2c/0xa4
   [  419.449486]  el0_svc+0x20/0x30
   [  419.452549]  el0_sync_handler+0xe8/0x114
   [  419.456482]  el0_sync+0x180/0x1c0
   [  419.459805] irq event stamp: 48666
   [  419.463218] hardirqs last  enabled at (48665): [] exit_to_kernel_mode+0x38/0x180
   [  419.472199] hardirqs last disabled at (48666): [] el1_dbg+0x24/0x50
   [  419.480048] softirqs last  enabled at (48664): [] __do_softirq+0x4dc/0x564
   [  419.488508] softirqs last disabled at (48659): [] __irq_exit_rcu+0x170/0x194
   [  419.497139] ---[ end trace 2989cd52be73b55a ]---
----->8-----

Test execution:

   https://lkft.validation.linaro.org/scheduler/job/7142331

Bisections (Arm64 and x86) point to:

   commit 47808d93a0cd0bb7358d9ef141e85216a4b86ef4
   Author: Francis Laniel <flaniel@...ux.microsoft.com>
   Date:   Fri Oct 20 13:42:49 2023 +0300

       tracing/kprobes: Return EADDRNOTAVAIL when func matches several symbols
       
       commit b022f0c7e404887a7c5229788fc99eff9f9a80d5 upstream.


Reverting made the warning disappear on both Arm64 and i386.

Reported-by: Linux Kernel Functional Testing <lkft@...aro.org>


Greetings!

Daniel Díaz
daniel.diaz@...aro.org


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ