Bug#977048: linux-image-4.19.0-13-amd64: Kernel oops in unmount ...chroot.../sys/firmware/efi/efivar

2020-12-10 Thread Salvatore Bonaccorso
Hi,

On Thu, Dec 10, 2020 at 10:57:17PM +0100, Salvatore Bonaccorso wrote:
> Hi,
> 
> On Thu, Dec 10, 2020 at 05:04:22PM +0100, Klaus Singvogel wrote:
> > Package: src:linux
> > Version: 4.19.160-2
> > Severity: important
> > 
> > Dear Maintainer,
> > 
> > *** Reporter, please consider answering these questions, where appropriate 
> > ***
> > 
> >* What led up to the situation?
> > 
> >  sudo mount -rbind /sys /${CHROOT}/sys
> > 
> >* What exactly did you do (or not do) that was effective (or 
> > ineffective)?
> > 
> >  sudo umount /${CHROOT}/sys/firmware/efi/efivar
> > 
> >* What was the outcome of this action?
> > 
> >  Segmentation fault and Kernel oops
> > 
> >* What outcome did you expect instead?
> > 
> >  No segmentation fault, no Kernel oops
> > 
> > Note:
> > This bug can be reproduced on further machines with this kernel version.
> > 
> > Here is the output of the oops:
> > 
> > [133082.213609] [ cut here ]
> > [133082.213610] kernel BUG at mm/slub.c:3950!
> > [133082.213615] invalid opcode:  [#1] SMP PTI
> > [133082.213617] CPU: 5 PID: 11559 Comm: umount Tainted: G U
> > 4.19.0-13-amd64 #1 Debian 4.19.160-2
> > [133082.213618] Hardware name: Micro-Star International Co., Ltd. 
> > MS-7B45/Z370 GAMING PRO CARBON (MS-7B45), BIOS A.B0 06/05/2020
> > [133082.213621] RIP: 0010:kfree+0x168/0x180
> > [133082.213622] Code: 5d 41 5c e9 fa 11 f9 ff 48 89 d9 48 89 da 41 b8 01 00 
> > 00 00 5b 4c 89 d6 5d 41 5c e9 02 f6 ff ff 0f 0b 49 8b 42 08 a8 01 75 c3 
> > <0f> 0b 48 8b 3d ff 48 dd 00 e9 c7 fe ff ff 66 2e 0f 1f 84 00 00 00
> > [133082.213623] RSP: 0018:b71549543e58 EFLAGS: 00010246
> > [133082.213624] RAX:  RBX: 941ddae5c000 RCX: 
> > a4ada018
> > [133082.213625] RDX:  RSI: 0296 RDI: 
> > 6be6
> > [133082.213626] RBP: c08c1040 R08: e66b51437208 R09: 
> > 0001
> > [133082.213626] R10: e66b516b9700 R11: e66b51707008 R12: 
> > c08bf742
> > [133082.213627] R13:  R14:  R15: 
> > 941ddae5c000
> > [133082.213628] FS:  7f6337c2c080() GS:941ddeb4() 
> > knlGS:
> > [133082.213629] CS:  0010 DS:  ES:  CR0: 80050033
> > [133082.213630] CR2: 7ffd34ee8cf8 CR3: 00042a628006 CR4: 
> > 003606e0
> > [133082.213631] Call Trace:
> > [133082.213635]  ? efivarfs_kill_sb+0x30/0x30 [efivarfs]
> > [133082.213637]  efivarfs_destroy+0x22/0x30 [efivarfs]
> > [133082.213639]  __efivar_entry_iter+0xd8/0x110
> > [133082.213642]  deactivate_locked_super+0x2f/0x70
> > [133082.213644]  cleanup_mnt+0x3f/0x70
> > [133082.213646]  task_work_run+0x8a/0xb0
> > [133082.213648]  exit_to_usermode_loop+0xeb/0xf0
> > [133082.213650]  do_syscall_64+0x10d/0x110
> > [133082.213652]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
> > [133082.213653] RIP: 0033:0x7f6338052507
> > [133082.213655] Code: 19 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 
> > 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 
> > <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 59 19 0c 00 f7 d8 64 89 01 48
> > [133082.213655] RSP: 002b:7ffd34eea528 EFLAGS: 0246 ORIG_RAX: 
> > 00a6
> > [133082.213657] RAX:  RBX: 563e3ae26ac0 RCX: 
> > 7f6338052507
> > [133082.213657] RDX: 0001 RSI:  RDI: 
> > 563e3ae26cd0
> > [133082.213658] RBP:  R08: 563e3ae27b40 R09: 
> > 7f63380d3e80
> > [133082.213659] R10:  R11: 0246 R12: 
> > 563e3ae26cd0
> > [133082.213659] R13: 7f63381781c4 R14: 563e3ae26bb8 R15: 
> > 
> > [133082.213661] Modules linked in: tcp_diag udp_diag raw_diag inet_diag 
> > unix_diag fuse rfkill uvcvideo videobuf2_vmalloc videobuf2_memops 
> > videobuf2_v4l2 videobuf2_common snd_usb_audio nls_ascii videodev nls_cp437 
> > snd_usbmidi_lib vfat snd_rawmidi intel_rapl media snd_seq_device fat 
> > snd_hda_codec_hdmi x86_pkg_temp_thermal intel_powerclamp coretemp 
> > snd_hda_codec_realtek kvm_intel snd_hda_codec_generic kvm irqbypass 
> > crct10dif_pclmul crc32_pclmul snd_hda_intel snd_hda_codec 
> > ghash_clmulni_intel intel_cstate efi_pstore snd_hda_core joydev sg 
> > intel_uncore snd_hwdep intel_rapl_perf snd_pcm iTCO_wdt snd_timer 
> > iTCO_vendor_support efivars snd pcspkr soundcore mei_me pcc_cpufreq mei 
> > acpi_pad acpi_tad evdev i2c_dev parport_pc sunrpc ppdev lp parport efivarfs 
> > ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 fscrypto
> > [133082.213677]  ecb btrfs zstd_decompress zstd_compress xxhash raid10 
> > raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor 
> > raid6_pq libcrc32c crc32c_generic raid1 raid0 multipath linear md_mod 
> > hid_logitech_hidpp hid_logitech_dj hid_generic usbhid hid sr_mod cdrom 
> > sd_mod uas usb_storage crc32c_intel i915 ahci libahci i2c_algo_bit 

Bug#977048: linux-image-4.19.0-13-amd64: Kernel oops in unmount ...chroot.../sys/firmware/efi/efivar

2020-12-10 Thread Salvatore Bonaccorso
Hi,

On Thu, Dec 10, 2020 at 05:04:22PM +0100, Klaus Singvogel wrote:
> Package: src:linux
> Version: 4.19.160-2
> Severity: important
> 
> Dear Maintainer,
> 
> *** Reporter, please consider answering these questions, where appropriate ***
> 
>* What led up to the situation?
> 
>  sudo mount -rbind /sys /${CHROOT}/sys
> 
>* What exactly did you do (or not do) that was effective (or ineffective)?
> 
>  sudo umount /${CHROOT}/sys/firmware/efi/efivar
> 
>* What was the outcome of this action?
> 
>  Segmentation fault and Kernel oops
> 
>* What outcome did you expect instead?
> 
>  No segmentation fault, no Kernel oops
> 
> Note:
> This bug can be reproduced on further machines with this kernel version.
> 
> Here is the output of the oops:
> 
> [133082.213609] [ cut here ]
> [133082.213610] kernel BUG at mm/slub.c:3950!
> [133082.213615] invalid opcode:  [#1] SMP PTI
> [133082.213617] CPU: 5 PID: 11559 Comm: umount Tainted: G U
> 4.19.0-13-amd64 #1 Debian 4.19.160-2
> [133082.213618] Hardware name: Micro-Star International Co., Ltd. 
> MS-7B45/Z370 GAMING PRO CARBON (MS-7B45), BIOS A.B0 06/05/2020
> [133082.213621] RIP: 0010:kfree+0x168/0x180
> [133082.213622] Code: 5d 41 5c e9 fa 11 f9 ff 48 89 d9 48 89 da 41 b8 01 00 
> 00 00 5b 4c 89 d6 5d 41 5c e9 02 f6 ff ff 0f 0b 49 8b 42 08 a8 01 75 c3 <0f> 
> 0b 48 8b 3d ff 48 dd 00 e9 c7 fe ff ff 66 2e 0f 1f 84 00 00 00
> [133082.213623] RSP: 0018:b71549543e58 EFLAGS: 00010246
> [133082.213624] RAX:  RBX: 941ddae5c000 RCX: 
> a4ada018
> [133082.213625] RDX:  RSI: 0296 RDI: 
> 6be6
> [133082.213626] RBP: c08c1040 R08: e66b51437208 R09: 
> 0001
> [133082.213626] R10: e66b516b9700 R11: e66b51707008 R12: 
> c08bf742
> [133082.213627] R13:  R14:  R15: 
> 941ddae5c000
> [133082.213628] FS:  7f6337c2c080() GS:941ddeb4() 
> knlGS:
> [133082.213629] CS:  0010 DS:  ES:  CR0: 80050033
> [133082.213630] CR2: 7ffd34ee8cf8 CR3: 00042a628006 CR4: 
> 003606e0
> [133082.213631] Call Trace:
> [133082.213635]  ? efivarfs_kill_sb+0x30/0x30 [efivarfs]
> [133082.213637]  efivarfs_destroy+0x22/0x30 [efivarfs]
> [133082.213639]  __efivar_entry_iter+0xd8/0x110
> [133082.213642]  deactivate_locked_super+0x2f/0x70
> [133082.213644]  cleanup_mnt+0x3f/0x70
> [133082.213646]  task_work_run+0x8a/0xb0
> [133082.213648]  exit_to_usermode_loop+0xeb/0xf0
> [133082.213650]  do_syscall_64+0x10d/0x110
> [133082.213652]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
> [133082.213653] RIP: 0033:0x7f6338052507
> [133082.213655] Code: 19 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 
> 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 
> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 59 19 0c 00 f7 d8 64 89 01 48
> [133082.213655] RSP: 002b:7ffd34eea528 EFLAGS: 0246 ORIG_RAX: 
> 00a6
> [133082.213657] RAX:  RBX: 563e3ae26ac0 RCX: 
> 7f6338052507
> [133082.213657] RDX: 0001 RSI:  RDI: 
> 563e3ae26cd0
> [133082.213658] RBP:  R08: 563e3ae27b40 R09: 
> 7f63380d3e80
> [133082.213659] R10:  R11: 0246 R12: 
> 563e3ae26cd0
> [133082.213659] R13: 7f63381781c4 R14: 563e3ae26bb8 R15: 
> 
> [133082.213661] Modules linked in: tcp_diag udp_diag raw_diag inet_diag 
> unix_diag fuse rfkill uvcvideo videobuf2_vmalloc videobuf2_memops 
> videobuf2_v4l2 videobuf2_common snd_usb_audio nls_ascii videodev nls_cp437 
> snd_usbmidi_lib vfat snd_rawmidi intel_rapl media snd_seq_device fat 
> snd_hda_codec_hdmi x86_pkg_temp_thermal intel_powerclamp coretemp 
> snd_hda_codec_realtek kvm_intel snd_hda_codec_generic kvm irqbypass 
> crct10dif_pclmul crc32_pclmul snd_hda_intel snd_hda_codec ghash_clmulni_intel 
> intel_cstate efi_pstore snd_hda_core joydev sg intel_uncore snd_hwdep 
> intel_rapl_perf snd_pcm iTCO_wdt snd_timer iTCO_vendor_support efivars snd 
> pcspkr soundcore mei_me pcc_cpufreq mei acpi_pad acpi_tad evdev i2c_dev 
> parport_pc sunrpc ppdev lp parport efivarfs ip_tables x_tables autofs4 ext4 
> crc16 mbcache jbd2 fscrypto
> [133082.213677]  ecb btrfs zstd_decompress zstd_compress xxhash raid10 
> raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor 
> raid6_pq libcrc32c crc32c_generic raid1 raid0 multipath linear md_mod 
> hid_logitech_hidpp hid_logitech_dj hid_generic usbhid hid sr_mod cdrom sd_mod 
> uas usb_storage crc32c_intel i915 ahci libahci i2c_algo_bit libata 
> drm_kms_helper mxm_wmi scsi_mod xhci_pci xhci_hcd aesni_intel drm e1000e 
> usbcore aes_x86_64 crypto_simd cryptd glue_helper i2c_i801 usb_common thermal 
> fan wmi video button
> [133082.213691] ---[ end trace fdc6cf3f029628a7 ]---
> [133082.303757] RIP: 0010:kfree+0x168/0x180
> 

Bug#977048: linux-image-4.19.0-13-amd64: Kernel oops in unmount ...chroot.../sys/firmware/efi/efivar

2020-12-10 Thread Klaus Singvogel
Package: src:linux
Version: 4.19.160-2
Severity: important

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?

 sudo mount -rbind /sys /${CHROOT}/sys

   * What exactly did you do (or not do) that was effective (or ineffective)?

 sudo umount /${CHROOT}/sys/firmware/efi/efivar

   * What was the outcome of this action?

 Segmentation fault and Kernel oops

   * What outcome did you expect instead?

 No segmentation fault, no Kernel oops

Note:
This bug can be reproduced on further machines with this kernel version.

Here is the output of the oops:

[133082.213609] [ cut here ]
[133082.213610] kernel BUG at mm/slub.c:3950!
[133082.213615] invalid opcode:  [#1] SMP PTI
[133082.213617] CPU: 5 PID: 11559 Comm: umount Tainted: G U
4.19.0-13-amd64 #1 Debian 4.19.160-2
[133082.213618] Hardware name: Micro-Star International Co., Ltd. MS-7B45/Z370 
GAMING PRO CARBON (MS-7B45), BIOS A.B0 06/05/2020
[133082.213621] RIP: 0010:kfree+0x168/0x180
[133082.213622] Code: 5d 41 5c e9 fa 11 f9 ff 48 89 d9 48 89 da 41 b8 01 00 00 
00 5b 4c 89 d6 5d 41 5c e9 02 f6 ff ff 0f 0b 49 8b 42 08 a8 01 75 c3 <0f> 0b 48 
8b 3d ff 48 dd 00 e9 c7 fe ff ff 66 2e 0f 1f 84 00 00 00
[133082.213623] RSP: 0018:b71549543e58 EFLAGS: 00010246
[133082.213624] RAX:  RBX: 941ddae5c000 RCX: 
a4ada018
[133082.213625] RDX:  RSI: 0296 RDI: 
6be6
[133082.213626] RBP: c08c1040 R08: e66b51437208 R09: 
0001
[133082.213626] R10: e66b516b9700 R11: e66b51707008 R12: 
c08bf742
[133082.213627] R13:  R14:  R15: 
941ddae5c000
[133082.213628] FS:  7f6337c2c080() GS:941ddeb4() 
knlGS:
[133082.213629] CS:  0010 DS:  ES:  CR0: 80050033
[133082.213630] CR2: 7ffd34ee8cf8 CR3: 00042a628006 CR4: 
003606e0
[133082.213631] Call Trace:
[133082.213635]  ? efivarfs_kill_sb+0x30/0x30 [efivarfs]
[133082.213637]  efivarfs_destroy+0x22/0x30 [efivarfs]
[133082.213639]  __efivar_entry_iter+0xd8/0x110
[133082.213642]  deactivate_locked_super+0x2f/0x70
[133082.213644]  cleanup_mnt+0x3f/0x70
[133082.213646]  task_work_run+0x8a/0xb0
[133082.213648]  exit_to_usermode_loop+0xeb/0xf0
[133082.213650]  do_syscall_64+0x10d/0x110
[133082.213652]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[133082.213653] RIP: 0033:0x7f6338052507
[133082.213655] Code: 19 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 
31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 
f0 ff ff 73 01 c3 48 8b 0d 59 19 0c 00 f7 d8 64 89 01 48
[133082.213655] RSP: 002b:7ffd34eea528 EFLAGS: 0246 ORIG_RAX: 
00a6
[133082.213657] RAX:  RBX: 563e3ae26ac0 RCX: 
7f6338052507
[133082.213657] RDX: 0001 RSI:  RDI: 
563e3ae26cd0
[133082.213658] RBP:  R08: 563e3ae27b40 R09: 
7f63380d3e80
[133082.213659] R10:  R11: 0246 R12: 
563e3ae26cd0
[133082.213659] R13: 7f63381781c4 R14: 563e3ae26bb8 R15: 

[133082.213661] Modules linked in: tcp_diag udp_diag raw_diag inet_diag 
unix_diag fuse rfkill uvcvideo videobuf2_vmalloc videobuf2_memops 
videobuf2_v4l2 videobuf2_common snd_usb_audio nls_ascii videodev nls_cp437 
snd_usbmidi_lib vfat snd_rawmidi intel_rapl media snd_seq_device fat 
snd_hda_codec_hdmi x86_pkg_temp_thermal intel_powerclamp coretemp 
snd_hda_codec_realtek kvm_intel snd_hda_codec_generic kvm irqbypass 
crct10dif_pclmul crc32_pclmul snd_hda_intel snd_hda_codec ghash_clmulni_intel 
intel_cstate efi_pstore snd_hda_core joydev sg intel_uncore snd_hwdep 
intel_rapl_perf snd_pcm iTCO_wdt snd_timer iTCO_vendor_support efivars snd 
pcspkr soundcore mei_me pcc_cpufreq mei acpi_pad acpi_tad evdev i2c_dev 
parport_pc sunrpc ppdev lp parport efivarfs ip_tables x_tables autofs4 ext4 
crc16 mbcache jbd2 fscrypto
[133082.213677]  ecb btrfs zstd_decompress zstd_compress xxhash raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq 
libcrc32c crc32c_generic raid1 raid0 multipath linear md_mod hid_logitech_hidpp 
hid_logitech_dj hid_generic usbhid hid sr_mod cdrom sd_mod uas usb_storage 
crc32c_intel i915 ahci libahci i2c_algo_bit libata drm_kms_helper mxm_wmi 
scsi_mod xhci_pci xhci_hcd aesni_intel drm e1000e usbcore aes_x86_64 
crypto_simd cryptd glue_helper i2c_i801 usb_common thermal fan wmi video button
[133082.213691] ---[ end trace fdc6cf3f029628a7 ]---
[133082.303757] RIP: 0010:kfree+0x168/0x180
[133082.303775] Code: 5d 41 5c e9 fa 11 f9 ff 48 89 d9 48 89 da 41 b8 01 00 00 
00 5b 4c 89 d6 5d 41 5c e9 02 f6 ff ff 0f 0b 49 8b 42 08 a8 01 75 c3 <0f> 0b 48 
8b 3d ff 48 dd 00 e9 c7 fe ff ff 66 2e 0f 1f 84 00 00 00
[133082.303776] RSP: 0018:b71549543e58 EFLAGS: 00010246