lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Fri, 8 Dec 2017 10:58:25 +0800
From:   kernel test robot <xiaolong.ye@...el.com>
To:     Thomas Gleixner <tglx@...utronix.de>
Cc:     Ingo Molnar <mingo@...nel.org>, Andy Lutomirski <luto@...nel.org>,
        Boris Ostrovsky <boris.ostrovsky@...cle.com>,
        Borislav Petkov <bp@...en8.de>,
        Borislav Petkov <bpetkov@...e.de>,
        Brian Gerst <brgerst@...il.com>,
        Dave Hansen <dave.hansen@...el.com>,
        Dave Hansen <dave.hansen@...ux.intel.com>,
        David Laight <David.Laight@...lab.com>,
        Denys Vlasenko <dvlasenk@...hat.com>,
        Eduardo Valentin <eduval@...zon.com>,
        Greg KH <gregkh@...uxfoundation.org>,
        "H. Peter Anvin" <hpa@...or.com>,
        Josh Poimboeuf <jpoimboe@...hat.com>,
        Juergen Gross <jgross@...e.com>,
        Linus Torvalds <torvalds@...ux-foundation.org>,
        Peter Zijlstra <peterz@...radead.org>,
        Rik van Riel <riel@...hat.com>,
        Will Deacon <will.deacon@....com>,
        LKML <linux-kernel@...r.kernel.org>,
        Stephen Rothwell <sfr@...b.auug.org.au>, lkp@...org
Subject: [lkp-robot] [x86/fixmap]  388313d7b3: BUG:unable_to_handle_kernel


FYI, we noticed the following commit (built with gcc-6):

commit: 388313d7b3f11b26b185394c599c6ec9e5d3963b ("x86/fixmap: Add LDT entries to user-shared fixmap")
https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master

in testcase: boot

on test machine: qemu-system-x86_64 -enable-kvm -smp 2 -m 512M

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):


+------------------------------------------+------------+------------+
|                                          | f5677d9ef4 | 388313d7b3 |
+------------------------------------------+------------+------------+
| boot_successes                           | 6          | 0          |
| boot_failures                            | 2          | 6          |
| BUG:kernel_hang_in_test_stage            | 2          |            |
| BUG:unable_to_handle_kernel              | 0          | 6          |
| Oops:#[##]                               | 0          | 6          |
| RIP:acpi_find_root_pointer               | 0          | 6          |
| Kernel_panic-not_syncing:Fatal_exception | 0          | 6          |
+------------------------------------------+------------+------------+



[    0.000000] BUG: unable to handle kernel paging request at ffffffff8700040e
[    0.000000] IP: acpi_find_root_pointer+0x43/0x14d
[    0.000000] PGD 1e10067 P4D 1e10067 PUD 1e11063 PMD 0 
[    0.000000] Oops: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 4.14.0-00117-g388313d #3
[    0.000000] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014
[    0.000000] task: ffffffff81e14500 task.stack: ffffffff81e00000
[    0.000000] RIP: 0010:acpi_find_root_pointer+0x43/0x14d
[    0.000000] RSP: 0000:ffffffff81e03de8 EFLAGS: 00010082
[    0.000000] RAX: ffffffff8700040e RBX: ffff88001ffdf982 RCX: 0000000000000000
[    0.000000] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff8211b070
[    0.000000] RBP: ffffffff81e03e08 R08: ffffffff822ede60 R09: 0000000000000001
[    0.000000] R10: 0000000000000003 R11: 0000000000000000 R12: ffffffff81e03e18
[    0.000000] R13: 000000001ffe0000 R14: 0000000002c71000 R15: ffffffff81e03ef8
[    0.000000] FS:  0000000000000000(0000) GS:ffffffff8217c000(0000) knlGS:0000000000000000
[    0.000000] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    0.000000] CR2: ffffffff8700040e CR3: 0000000001e0f000 CR4: 00000000000006b0
[    0.000000] Call Trace:
[    0.000000]  acpi_os_get_root_pointer+0x27/0x2d
[    0.000000]  acpi_initialize_tables+0x47/0x5b
[    0.000000]  acpi_table_init+0x57/0x1dc
[    0.000000]  acpi_boot_table_init+0x23/0x88
[    0.000000]  setup_arch+0x855/0xb7f
[    0.000000]  ? printk+0x43/0x4b
[    0.000000]  start_kernel+0x62/0x626
[    0.000000]  x86_64_start_reservations+0x2a/0x2c
[    0.000000]  x86_64_start_kernel+0x72/0x75
[    0.000000]  secondary_startup_64+0xa5/0xb0
[    0.000000] Code: bf 0e 04 00 00 e8 a6 89 3f ff 48 85 c0 75 1c 41 b8 02 00 00 00 b9 0e 04 00 00 48 c7 c2 6b 38 c6 81 be a2 00 00 00 e9 9e 00 00 00 <0f> b7 18 48 89 c7 be 02 00 00 00 e8 85 89 3f ff c1 e3 04 81 fb 
[    0.000000] RIP: acpi_find_root_pointer+0x43/0x14d RSP: ffffffff81e03de8
[    0.000000] CR2: ffffffff8700040e
[    0.000000] ---[ end trace 2507864299958132 ]---


To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> job-script  # job-script is attached in this email



Thanks,
Xiaolong

View attachment "config-4.14.0-00117-g388313d" of type "text/plain" (91862 bytes)

View attachment "job-script" of type "text/plain" (4112 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (2992 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ