[<prev] [next>] [day] [month] [year] [list]
Message-ID: <574b3f18.r6FgrTMbVUsrxFpJ%xiaolong.ye@intel.com>
Date: Mon, 30 May 2016 03:12:24 +0800
From: kernel test robot <xiaolong.ye@...el.com>
To: Andy Lutomirski <luto@...nel.org>
Cc: lkp@...org, Andy Lutomirski <luto@...capital.net>,
LKML <linux-kernel@...r.kernel.org>
Subject: [[DEBUG] force CONFIG_DEBUG_UACCESS] 8829c7a53e: BUG: tried to
access memory at 0x7f962a0f while not in USER_DS
FYI, we noticed the following commit:
https://git.kernel.org/pub/scm/linux/kernel/git/luto/linux.git x86/uaccess
commit 8829c7a53e1b4e44f6c24c6d165cf9d1cf8b1f14 ("[DEBUG] force CONFIG_DEBUG_UACCESS")
on test machine: vm-lkp-wsx03-yocto-i386: 1 threads qemu-system-i386 -enable-kvm with 320M memory
caused below changes:
+----------------+------------+------------+
| | d126f75418 | 8829c7a53e |
+----------------+------------+------------+
| boot_successes | 10 | 0 |
+----------------+------------+------------+
[ 4.297648] Write protecting the kernel text: 4744k
[ 4.298607] Write protecting the kernel read-only data: 2404k
[ 4.298607] Write protecting the kernel read-only data: 2404k
[ 4.307394] BUG: tried to access memory at 0x7f962a0f while not in USER_DS
[ 4.307394] BUG: tried to access memory at 0x7f962a0f while not in USER_DS
[ 4.308810] ------------[ cut here ]------------
[ 4.308810] ------------[ cut here ]------------
[ 4.309748] kernel BUG at arch/x86/mm/extable.c:189!
[ 4.309748] kernel BUG at arch/x86/mm/extable.c:189!
[ 4.311080] invalid opcode: 0000 [#1]
[ 4.311080] invalid opcode: 0000 [#1] DEBUG_PAGEALLOC DEBUG_PAGEALLOC
[ 4.312088] Modules linked in:
[ 4.312088] Modules linked in:
[ 4.312684] CPU: 0 PID: 89 Comm: init Not tainted 4.6.0-rc6-00086-g8829c7a #1
[ 4.312684] CPU: 0 PID: 89 Comm: init Not tainted 4.6.0-rc6-00086-g8829c7a #1
[ 4.314033] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Debian-1.8.2-1 04/01/2014
[ 4.314033] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Debian-1.8.2-1 04/01/2014
[ 4.315738] task: 9042ccc0 ti: 904aa000 task.ti: 904aa000
[ 4.315738] task: 9042ccc0 ti: 904aa000 task.ti: 904aa000
[ 4.316763] EIP: 0060:[<8103bd06>] EFLAGS: 00010296 CPU: 0
[ 4.316763] EIP: 0060:[<8103bd06>] EFLAGS: 00010296 CPU: 0
[ 4.317826] EIP is at bad_uaccess_kernel_ds+0x16/0x20
[ 4.317826] EIP is at bad_uaccess_kernel_ds+0x16/0x20
[ 4.318795] EAX: 0000003e EBX: 7f962a0c ECX: 9042ccc0 EDX: 00000001
[ 4.318795] EAX: 0000003e EBX: 7f962a0c ECX: 9042ccc0 EDX: 00000001
[ 4.319973] ESI: 00000000 EDI: 9042ccc0 EBP: 904abf18 ESP: 904abf10
[ 4.319973] ESI: 00000000 EDI: 9042ccc0 EBP: 904abf18 ESP: 904abf10
[ 4.321150] DS: 007b ES: 007b FS: 0000 GS: 00e0 SS: 0068
[ 4.321150] DS: 007b ES: 007b FS: 0000 GS: 00e0 SS: 0068
[ 4.322170] CR0: 80050033 CR2: 0804f520 CR3: 1049f000 CR4: 00000690
[ 4.322170] CR0: 80050033 CR2: 0804f520 CR3: 1049f000 CR4: 00000690
[ 4.323358] Stack:
[ 4.323358] Stack:
[ 4.323746] 81646e0c
[ 4.323746] 81646e0c 7f962a0f 7f962a0f 904abf2c 904abf2c 811312b6 811312b6 90b87c10 90b87c10 00000001 00000001 80130020 80130020 904abf68 904abf68
[ 4.325319] 811323d7
[ 4.325319] 811323d7 00000002 00000002 00000000 00000000 00000000 00000000 81132006 81132006 9048f97c 9048f97c 00000000 00000000 90b87c10 90b87c10
[ 4.326898] 7f962a0c
[ 4.326898] 7f962a0c 9048f920 9048f920 00000000 00000000 904abfac 904abfac 904aa000 904aa000 47fdcff4 47fdcff4 904abf78 904abf78 811328e9 811328e9
[ 4.328489] Call Trace:
[ 4.328489] Call Trace:
[ 4.328958] [<811312b6>] count+0x66/0xa0
[ 4.328958] [<811312b6>] count+0x66/0xa0
[ 4.329948] [<811323d7>] do_execveat_common+0x4a7/0x740
[ 4.329948] [<811323d7>] do_execveat_common+0x4a7/0x740
[ 4.330947] [<81132006>] ? do_execveat_common+0xd6/0x740
[ 4.330947] [<81132006>] ? do_execveat_common+0xd6/0x740
[ 4.331962] [<811328e9>] SyS_execve+0x29/0x30
[ 4.331962] [<811328e9>] SyS_execve+0x29/0x30
[ 4.332801] [<81001360>] do_int80_syscall_32+0x70/0x1c0
[ 4.332801] [<81001360>] do_int80_syscall_32+0x70/0x1c0
[ 4.333811] [<814a04a6>] entry_INT80_32+0x36/0x36
[ 4.333811] [<814a04a6>] entry_INT80_32+0x36/0x36
[ 4.334711] Code:
[ 4.334711] Code: 90 90 8d 8d 74 74 26 26 00 00 31 31 c0 c0 5d 5d c3 c3 8d 8d b6 b6 00 00 00 00 00 00 00 00 8d 8d bf bf 00 00 00 00 00 00 00 00 55 55 89 89 e5 e5 83 83 ec ec 08 08 89 89 44 44 24 24 04 04 c7 c7 04 04 24 24 0c 0c 6e 6e 64 64 81 81 e8 e8 26 26 b2 b2 0a 0a 00 00 <0f> <0f> 0b 0b 90 90 8d 8d b4 b4 26 26 00 00 00 00 00 00 00 00 55 55 89 89 e5 e5 83 83 ec ec 18 18 89 89 5d 5d f4 f4 89 89 c3 c3
[ 4.339197] EIP: [<8103bd06>]
[ 4.339197] EIP: [<8103bd06>] bad_uaccess_kernel_ds+0x16/0x20bad_uaccess_kernel_ds+0x16/0x20 SS:ESP 0068:904abf10
SS:ESP 0068:904abf10
[ 4.340676] ---[ end trace ee8a6b2c126871eb ]---
[ 4.340676] ---[ end trace ee8a6b2c126871eb ]---
FYI, raw QEMU command line is:
qemu-system-i386 -enable-kvm -kernel /pkg/linux/i386-randconfig-n0-201622/gcc-6/8829c7a53e1b4e44f6c24c6d165cf9d1cf8b1f14/vmlinuz-4.6.0-rc6-00086-g8829c7a -append 'root=/dev/ram0 user=lkp job=/lkp/scheduled/vm-lkp-wsx03-yocto-i386-11/bisect_boot-1-yocto-minimal-i386.cgz-i386-randconfig-n0-201622-8829c7a53e1b4e44f6c24c6d165cf9d1cf8b1f14-20160530-94983-1lh2mjs-0.yaml ARCH=i386 kconfig=i386-randconfig-n0-201622 branch=luto/x86/uaccess commit=8829c7a53e1b4e44f6c24c6d165cf9d1cf8b1f14 BOOT_IMAGE=/pkg/linux/i386-randconfig-n0-201622/gcc-6/8829c7a53e1b4e44f6c24c6d165cf9d1cf8b1f14/vmlinuz-4.6.0-rc6-00086-g8829c7a max_uptime=600 RESULT_ROOT=/result/boot/1/vm-lkp-wsx03-yocto-i386/yocto-minimal-i386.cgz/i386-randconfig-n0-201622/gcc-6/8829c7a53e1b4e44f6c24c6d165cf9d1cf8b1f14/0 LKP_SERVER=inn earlyprintk=ttyS0,115200 systemd.log_level=err debug apic=debug sysrq_always_enabled rcupdate.rcu_cpu_stall_timeout=100 panic=-1 softlockup_panic=1 nmi_watchdog=panic oops=panic load_ramdisk=2 prompt_ramdisk=0 console=ttyS0,115200 console=tty0 vga=normal rw ip=::::vm-lkp-wsx03-yocto-i386-11::dhcp drbd.minor_count=8' -initrd /fs/sdc1/initrd-vm-lkp-wsx03-yocto-i386-11 -m 320 -smp 1 -device e1000,netdev=net0 -netdev user,id=net0 -boot order=nc -no-reboot -watchdog i6300esb -rtc base=localtime -drive file=/fs/sdc1/disk0-vm-lkp-wsx03-yocto-i386-11,media=disk,if=virtio -pidfile /dev/shm/kboot/pid-vm-lkp-wsx03-yocto-i386-11 -serial file:/dev/shm/kboot/serial-vm-lkp-wsx03-yocto-i386-11 -daemonize -display none -monitor null
Thanks,
Kernel Test Robot
View attachment "config-4.6.0-rc6-00086-g8829c7a" of type "text/plain" (87104 bytes)
Download attachment "dmesg.xz" of type "application/octet-stream" (10272 bytes)
Powered by blists - more mailing lists