lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20170910142750.GE29265@yexl-desktop>
Date:   Sun, 10 Sep 2017 22:27:50 +0800
From:   kernel test robot <xiaolong.ye@...el.com>
To:     Andy Lutomirski <luto@...nel.org>
Cc:     Linus Torvalds <torvalds@...ux-foundation.org>,
        Jiri Kosina <jikos@...nel.org>,
        LKML <linux-kernel@...r.kernel.org>, lkp@...org
Subject: [lkp-robot] [x86/mm]  72c0098d92:
 WARNING:at_arch/x86/mm/tlb.c:#initialize_tlbstate_and_flush


FYI, we noticed the following commit:

commit: 72c0098d92cedb11c7e0151e84918840a4e96b31 ("x86/mm: Reinitialize TLB state on hotplug and resume")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master

in testcase: boot

on test machine: qemu-system-x86_64 -enable-kvm -m 420M

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):


+-------------------------------------------------------------+------------+------------+
|                                                             | 80cee03bf1 | 72c0098d92 |
+-------------------------------------------------------------+------------+------------+
| boot_successes                                              | 8          | 0          |
| boot_failures                                               | 0          | 8          |
| WARNING:at_arch/x86/mm/tlb.c:#initialize_tlbstate_and_flush | 0          | 8          |
+-------------------------------------------------------------+------------+------------+



[    0.000000] WARNING: CPU: 0 PID: 0 at arch/x86/mm/tlb.c:245 initialize_tlbstate_and_flush+0x68/0xdd
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 4.13.0-06467-g72c0098 #1
[    0.000000] task: ffffffff82a74500 task.stack: ffffffff82a00000
[    0.000000] RIP: 0010:initialize_tlbstate_and_flush+0x68/0xdd
[    0.000000] RSP: 0000:ffffffff82a03e90 EFLAGS: 00010002
[    0.000000] RAX: 0000000002a6f000 RBX: ffffffff82c78da0 RCX: 0000000002a6f000
[    0.000000] RDX: 00000000000006b0 RSI: 0000000000000000 RDI: 000000000000001b
[    0.000000] RBP: ffffffff82a03ea0 R08: 0000000000000001 R09: 0000000000000000
[    0.000000] R10: ffffffff82a03e90 R11: ffff88001a0af000 R12: 0000000000000000
[    0.000000] R13: ffffffff82f10960 R14: ffff88001a17d4c0 R15: 0000000000000000
[    0.000000] FS:  0000000000000000(0000) GS:ffffffff82a91000(0000) knlGS:0000000000000000
[    0.000000] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    0.000000] CR2: ffff880004309000 CR3: 0000000002a6f000 CR4: 00000000000006b0
[    0.000000] Call Trace:
[    0.000000]  cpu_init+0x165/0x284
[    0.000000]  ? set_pte_vaddr+0x28/0x2a
[    0.000000]  trap_init+0x3f/0x51
[    0.000000]  start_kernel+0x230/0x43b
[    0.000000]  x86_64_start_reservations+0x2a/0x2c
[    0.000000]  x86_64_start_kernel+0x75/0x78
[    0.000000]  secondary_startup_64+0xa5/0xa5
[    0.000000] Code: 00 00 00 80 ff 77 00 00 48 01 f2 48 39 d1 74 02 0f ff 48 8b 15 2c 59 e1 01 80 e2 01 74 0f 48 8b 15 5c 4c a6 01 0f ba e2 11 72 02 <0f> ff 48 25 00 f0 ff ff 48 89 c7 ff 14 25 b8 49 81 82 66 c7 05 
[    0.000000] random: get_random_bytes called from init_oops_id+0x21/0x36 with crng_init=0
[    0.000000] ---[ end trace 0000000000000000 ]---


To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> job-script  # job-script is attached in this email



Thanks,
Xiaolong

View attachment "config-4.13.0-06467-g72c0098" of type "text/plain" (115532 bytes)

View attachment "job-script" of type "text/plain" (4106 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (13556 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ