[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20170720014238.GH27396@yexl-desktop>
Date: Thu, 20 Jul 2017 09:42:38 +0800
From: kernel test robot <xiaolong.ye@...el.com>
To: Daniel Micay <danielmicay@...il.com>
Cc: Linus Torvalds <torvalds@...ux-foundation.org>,
Kees Cook <keescook@...omium.org>,
Arnd Bergmann <arnd@...db.de>,
Mark Rutland <mark.rutland@....com>,
Daniel Axtens <dja@...ens.net>,
Rasmus Villemoes <linux@...musvillemoes.dk>,
Andy Shevchenko <andriy.shevchenko@...ux.intel.com>,
Chris Metcalf <cmetcalf@...hip.com>,
Thomas Gleixner <tglx@...utronix.de>,
"H. Peter Anvin" <hpa@...or.com>, Ingo Molnar <mingo@...e.hu>,
Andrew Morton <akpm@...ux-foundation.org>,
LKML <linux-kernel@...r.kernel.org>, lkp@...org
Subject: [lkp-robot] [include/linux/string.h] 6974f0c455:
kernel_BUG_at_lib/string.c
FYI, we noticed the following commit:
commit: 6974f0c4555e285ab217cee58b6e874f776ff409 ("include/linux/string.h: add the option of fortified string.h functions")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master
in testcase: boot
on test machine: qemu-system-i386 -enable-kvm -m 256M
caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):
[ 8.134860] kernel BUG at lib/string.c:985!
[ 8.134860] kernel BUG at lib/string.c:985!
[ 8.134863] invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC
[ 8.134863] invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC
[ 8.134864] Modules linked in:
[ 8.134864] Modules linked in:
[ 8.134867] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 4.12.0-10998-g6974f0c #2
[ 8.134867] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 4.12.0-10998-g6974f0c #2
[ 8.134869] task: 8005c000 task.stack: 8005e000
[ 8.134869] task: 8005c000 task.stack: 8005e000
[ 8.134872] EIP: fortify_panic+0xe/0x10
[ 8.134872] EIP: fortify_panic+0xe/0x10
[ 8.134873] EFLAGS: 00210246 CPU: 0
[ 8.134873] EFLAGS: 00210246 CPU: 0
[ 8.134875] EAX: 00000022 EBX: 89d33e08 ECX: 00000003 EDX: 784c6e40
[ 8.134875] EAX: 00000022 EBX: 89d33e08 ECX: 00000003 EDX: 784c6e40
[ 8.134876] ESI: 00000006 EDI: 8be97ffc EBP: 8005fe3c ESP: 8005fe34
[ 8.134876] ESI: 00000006 EDI: 8be97ffc EBP: 8005fe3c ESP: 8005fe34
[ 8.134878] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068
[ 8.134878] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068
[ 8.134879] CR0: 80050033 CR2: 00000000 CR3: 0c67a000 CR4: 00000690
[ 8.134879] CR0: 80050033 CR2: 00000000 CR3: 0c67a000 CR4: 00000690
[ 8.134882] Call Trace:
[ 8.134882] Call Trace:
[ 8.134886] arch_prepare_optimized_kprobe+0xd5/0x171
[ 8.134886] arch_prepare_optimized_kprobe+0xd5/0x171
[ 8.134887] ? 0x90a2c000
[ 8.134887] ? 0x90a2c000
[ 8.134889] ? 0x90a2c000
[ 8.134889] ? 0x90a2c000
[ 8.134893] ? 0x90a2c02a
[ 8.134893] ? 0x90a2c02a
[ 8.134894] ? 0x90a2c039
[ 8.134894] ? 0x90a2c039
[ 8.134895] ? 0x90a2c02f
[ 8.134895] ? 0x90a2c02f
[ 8.134898] alloc_aggr_kprobe+0x3a/0x44
[ 8.134898] alloc_aggr_kprobe+0x3a/0x44
[ 8.134900] register_kprobe+0x366/0x3ca
[ 8.134900] register_kprobe+0x366/0x3ca
[ 8.134903] init_test_probes+0x43/0x41e
[ 8.134903] init_test_probes+0x43/0x41e
[ 8.134905] ? register_module_notifier+0xf/0x11
[ 8.134905] ? register_module_notifier+0xf/0x11
[ 8.134909] init_kprobes+0x25d/0x284
[ 8.134909] init_kprobes+0x25d/0x284
[ 8.134912] ? debugfs_kprobe_init+0xee/0xee
[ 8.134912] ? debugfs_kprobe_init+0xee/0xee
[ 8.134914] do_one_initcall+0x7e/0x121
[ 8.134914] do_one_initcall+0x7e/0x121
[ 8.134916] ? parse_args+0x1a8/0x29b
[ 8.134916] ? parse_args+0x1a8/0x29b
[ 8.134921] ? kernel_init_freeable+0xfd/0x1f8
[ 8.134921] ? kernel_init_freeable+0xfd/0x1f8
[ 8.134923] kernel_init_freeable+0x131/0x1f8
[ 8.134923] kernel_init_freeable+0x131/0x1f8
[ 8.134926] ? rest_init+0xe6/0xe6
[ 8.134926] ? rest_init+0xe6/0xe6
[ 8.134928] kernel_init+0x8/0xd0
[ 8.134928] kernel_init+0x8/0xd0
[ 8.134932] ret_from_fork+0x19/0x24
[ 8.134932] ret_from_fork+0x19/0x24
[ 8.134936] Code: e0 83 e1 07 01 d1 39 cb 74 09 89 f0 3a 03 75 05 43 eb f3 31 db 5a 89 d8 5b 5e 5f 5d c3 55 89 e5 50 68 03 df 3e 8c e8 71 8f c9 ff <0f> 0b 55 31 c9 89 e5 56 53 89 d3 89 c6 89 c2 3b 1b 74 16 0f ff
[ 8.134936] Code: e0 83 e1 07 01 d1 39 cb 74 09 89 f0 3a 03 75 05 43 eb f3 31 db 5a 89 d8 5b 5e 5f 5d c3 55 89 e5 50 68 03 df 3e 8c e8 71 8f c9 ff <0f> 0b 55 31 c9 89 e5 56 53 89 d3 89 c6 89 c2 3b 1b 74 16 0f ff
[ 8.134973] EIP: fortify_panic+0xe/0x10 SS:ESP: 0068:8005fe34
[ 8.134973] EIP: fortify_panic+0xe/0x10 SS:ESP: 0068:8005fe34
[ 8.134976] ---[ end trace 897c8f39c79b92e0 ]---
To reproduce:
git clone https://github.com/01org/lkp-tests.git
cd lkp-tests
bin/lkp qemu -k <bzImage> job-script # job-script is attached in this email
Thanks,
Xiaolong
View attachment "config-4.12.0-10998-g6974f0c" of type "text/plain" (92625 bytes)
Download attachment "dmesg.xz" of type "application/octet-stream" (8140 bytes)
Powered by blists - more mailing lists