lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <c65c3c23-c945-4fad-9e39-6e229b979592@roeck-us.net>
Date: Mon, 12 Aug 2024 14:49:26 -0700
From: Guenter Roeck <linux@...ck-us.net>
To: Greg Kroah-Hartman <gregkh@...uxfoundation.org>, stable@...r.kernel.org
Cc: patches@...ts.linux.dev, linux-kernel@...r.kernel.org,
 torvalds@...ux-foundation.org, akpm@...ux-foundation.org, shuah@...nel.org,
 patches@...nelci.org, lkft-triage@...ts.linaro.org, pavel@...x.de,
 jonathanh@...dia.com, f.fainelli@...il.com, sudipm.mukherjee@...il.com,
 srw@...dewatkins.net, rwarsow@....de, conor@...nel.org,
 allen.lkml@...il.com, broonie@...nel.org
Subject: Re: [PATCH 6.1 00/86] 6.1.104-rc2 review

Hi,

On 8/8/24 02:11, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 6.1.104 release.
> There are 86 patches in this series, all will be posted as a response
> to this one.  If anyone has any issues with these being applied, please
> let me know.
> 
> Responses should be made by Sat, 10 Aug 2024 09:11:02 +0000.
> Anything received after that time might be too late.
> 
> The whole patch series can be found in one patch at:
> 	https://www.kernel.org/pub/linux/kernel/v6.x/stable-review/patch-6.1.104-rc2.gz
> or in the git tree and branch at:
> 	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-6.1.y
> and the diffstat can be found below.
> 
...
> Naohiro Aota <naohiro.aota@....com>
>      btrfs: zoned: fix zone_unusable accounting on making block group read-write again
> 

This patch results in a variety of problems with the parisc64 qemu emulation.
Some examples from various test runs:

[   10.527204] alg: akcipher: test 1 failed for rsa-generic, err=-22
[   10.529743] alg: self-tests for rsa using rsa-generic failed (rc=-22)
[   10.529905] ------------[ cut here ]------------
[   10.530276] alg: self-tests for rsa using rsa-generic failed (rc=-22)
[   10.530732] WARNING: CPU: 0 PID: 50 at crypto/testmgr.c:5907 alg_test+0x618/0x688

[    7.420056] ==================================================================
[    7.420507] BUG: KFENCE: invalid read in walk_stackframe.isra.0+0xb4/0x138
[    7.420507]
[    7.420827] Invalid read at 0x0000000042f07000:
[    7.421037]  walk_stackframe.isra.0+0xb4/0x138
[    7.421204]  arch_stack_walk+0x38/0x50
[    7.421338]  stack_trace_save_regs+0x58/0x70
[    7.421498]  kfence_report_error+0x14c/0x730
[    7.421649]  kfence_handle_page_fault+0x2c8/0x2d0
[    7.421996]  handle_interruption+0x9b0/0xb58
[    7.422168]  intr_check_sig+0x0/0x3c

[    8.891194] =============================================================================
[    8.891558] BUG sgpool-32 (Tainted: G    B   W        N): Wrong object count. Counter is 3 but counted were 18

[    0.403174] =============================================================================
[    0.403568] BUG audit_buffer (Not tainted): Wrong object count. Counter is 1 but counted were 34

[    0.505914] =============================================================================
[    0.506258] BUG skbuff_head_cache (Tainted: G    B             ): Freechain corrupt

[    2.831636] =============================================================================
[    2.832144] BUG skbuff_head_cache (Tainted: G    B             ): Left Redzone overwritten

Reverting it fixes the problem.

Bisect log is attached for reference.


I tried to repeat the test with v6.1.105-rc1, but that fails to compile for parisc64.

/home/groeck/src/linux-stable/include/linux/slab.h:228: warning: "ARCH_KMALLOC_MINALIGN" redefined
   228 | #define ARCH_KMALLOC_MINALIGN ARCH_DMA_MINALIGN

This is due to commit 96423e23e05b ("parisc: fix a possible DMA corruption").
After reverting that patch I don't see the above problems anymore in v6.1.105-rc1,
so it looks like the btrfs patches in v6.1.105-rc1 may have fixed it (or maybe
there is another hidden bug in the parisc64 qemu emulation).

Guenter

---
# bad: [36790ef5e00b69ccb92817f95ba1928eea24eebb] Linux 6.1.104
# good: [48d525b0e4634c487cf46a41c1e2824e9ee258ce] Linux 6.1.103
git bisect start 'HEAD' 'v6.1.103'
# good: [d06daf0ad645d9225a3ff6958dd82e1f3988fa64] sched: act_ct: take care of padding in struct zones_ht_key
git bisect good d06daf0ad645d9225a3ff6958dd82e1f3988fa64
# good: [ed15fdf30736a255c0e4f5d0263e12cf6636fade] rust: SHADOW_CALL_STACK is incompatible with Rust
git bisect good ed15fdf30736a255c0e4f5d0263e12cf6636fade
# bad: [5670466033d14329aaa87e726a481a6c56892eff] drm/i915: Fix possible int overflow in skl_ddi_calculate_wrpll()
git bisect bad 5670466033d14329aaa87e726a481a6c56892eff
# bad: [47ab33e1d6a796a82f9b7a70ed95c9649e92d7d2] mptcp: sched: check both directions for backup
git bisect bad 47ab33e1d6a796a82f9b7a70ed95c9649e92d7d2
# good: [8bb9cf2edf490e65678f2d57634ac763a778aeb6] HID: wacom: Modify pen IDs
git bisect good 8bb9cf2edf490e65678f2d57634ac763a778aeb6
# bad: [5db999fff545b924b24c9afd368ef5c17279b176] protect the fetch of ->fd[fd] in do_dup2() from mispredictions
git bisect bad 5db999fff545b924b24c9afd368ef5c17279b176
# bad: [36dac679722e5aa68c9efa822a38a5ea0c107342] btrfs: zoned: fix zone_unusable accounting on making block group read-
write again
git bisect bad 36dac679722e5aa68c9efa822a38a5ea0c107342
# first bad commit: [36dac679722e5aa68c9efa822a38a5ea0c107342] btrfs: zoned: fix zone_unusable accounting on making bloc
k group read-write again



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ