lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20170609053058.GB21477@yexl-desktop>
Date:   Fri, 9 Jun 2017 13:30:58 +0800
From:   kernel test robot <xiaolong.ye@...el.com>
To:     Andy Lutomirski <luto@...nel.org>
Cc:     Andrew Banman <abanman@....com>, Mike Travis <travis@....com>,
        Dimitri Sivanich <sivanich@....com>,
        Juergen Gross <jgross@...e.com>,
        Boris Ostrovsky <boris.ostrovsky@...cle.com>,
        LKML <linux-kernel@...r.kernel.org>,
        Andy Lutomirski <luto@...capital.net>, lkp@...org
Subject: [lkp-robot] [x86/mm]  d52d163f42:
 WARNING:at_arch/x86/mm/tlb.c:#switch_mm_irqs_off


FYI, we noticed the following commit:

commit: d52d163f428136feb592f7546cb2333cfad775bf ("x86/mm: Rework lazy TLB mode and TLB freshness tracking")
https://git.kernel.org/cgit/linux/kernel/git/luto/linux.git x86/pcid

in testcase: trinity
with following parameters:

	runtime: 300s

test-description: Trinity is a linux system call fuzz tester.
test-url: http://codemonkey.org.uk/projects/trinity/


on test machine: qemu-system-i386 -enable-kvm -smp 2 -m 320M

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):


+--------------------------------------------------+------------+------------+
|                                                  | 195a7a2576 | d52d163f42 |
+--------------------------------------------------+------------+------------+
| boot_successes                                   | 8          | 3          |
| boot_failures                                    | 0          | 7          |
| WARNING:at_arch/x86/mm/tlb.c:#switch_mm_irqs_off | 0          | 7          |
| EIP:switch_mm_irqs_off                           | 0          | 7          |
+--------------------------------------------------+------------+------------+



[    7.985468] WARNING: CPU: 0 PID: 0 at arch/x86/mm/tlb.c:83 switch_mm_irqs_off+0x23/0x393
[    7.986572] Modules linked in:
[    7.986920] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.12.0-rc4-00017-gd52d163 #1
[    7.987754] task: 79fb4a40 task.stack: 79faa000
[    7.988257] EIP: switch_mm_irqs_off+0x23/0x393
[    7.988761] EFLAGS: 00010203 CPU: 0
[    7.989157] EAX: 00000202 EBX: 79fe5260 ECX: 00000000 EDX: 79e4aa05
[    7.989854] ESI: 8b0959c0 EDI: 79fe5498 EBP: 79fabf18 ESP: 79fabf08
[    7.990552]  DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
[    7.991159] CR0: 80050033 CR2: 6f6f79c0 CR3: 0c453000 CR4: 00000690
[    7.991858] Call Trace:
[    7.992145]  idle_task_exit+0x45/0x55
[    7.992565]  play_dead_common+0x8/0x1a
[    7.992988]  native_play_dead+0xa/0xd2
[    7.993407]  arch_cpu_idle_dead+0x9/0xb
[    7.993847]  do_idle+0x42/0x166
[    7.994206]  cpu_startup_entry+0x56/0x58
[    7.994654]  rest_init+0x108/0x10d
[    7.995039]  start_kernel+0x3fe/0x406
[    7.995463]  i386_start_kernel+0x9a/0x9e
[    7.995902]  startup_32_smp+0x166/0x168
[    7.996333] Code: e5 e8 02 fd ff ff 5d c3 55 89 e5 57 56 53 51 89 d3 e8 fc e7 36 00 64 8b 35 00 04 17 7a 89 c1 9c 58 8d 74 26 00 0f ba e0 09 73 02 <0f> ff 39 de a1 5c 02 0c 7a 0f 85 3c 01 00 00 39 c1 8b 93 bc 01
[    7.998498] ---[ end trace 67c561e2f6b242ff ]---


To reproduce:

        git clone https://github.com/01org/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> job-script  # job-script is attached in this email



Thanks,
Xiaolong

View attachment "config-4.12.0-rc4-00017-gd52d163" of type "text/plain" (103809 bytes)

View attachment "job-script" of type "text/plain" (3869 bytes)

Download attachment "dmesg.xz" of type "application/octet-stream" (12632 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ