lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 30 Nov 2017 21:24:44 +0800
From:   Fengguang Wu <fengguang.wu@...el.com>
To:     Masami Hiramatsu <mhiramat@...nel.org>
Cc:     Steven Rostedt <rostedt@...dmis.org>,
        Linus Torvalds <torvalds@...ux-foundation.org>,
        linux-kernel@...r.kernel.org, lkp@...org,
        "labbott@...hat.com" <labbott@...hat.com>
Subject: [arch_copy_kprobe] WARNING: CPU: 0 PID: 1 at mm/vmalloc.c:301
 vmalloc_to_page+0x2bf/0x416

Hello,

FYI this happens in mainline kernel 4.15.0-rc1.
It looks like a new regression. Bisect is on the way.

It occurs in 2 out of 11 boots.

[    5.083644] rcu-perf:--- Start of test: nreaders=0 nwriters=1 verbose=1 shutdown=1
[    5.085168] rcu-torture: Creating rcu_perf_shutdown task
[    5.092218] rcu-torture: Creating rcu_perf_writer task
[    5.093360] rcu-perf: rcu_perf_writer task started
[    5.099058] Kprobe smoke test: started
[    5.101137] WARNING: CPU: 0 PID: 1 at mm/vmalloc.c:301 vmalloc_to_page+0x2bf/0x416:
						vmalloc_to_page at mm/vmalloc.c:301
[    5.102564] Modules linked in:
[    5.103087] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 4.15.0-rc1 #189
[    5.104031] task: ffff88001d068000 task.stack: ffff88001d06c000
[    5.104031] RIP: 0010:vmalloc_to_page+0x2bf/0x416:
						vmalloc_to_page at mm/vmalloc.c:301
[    5.104031] RSP: 0000:ffff88001d06fce8 EFLAGS: 00010293
[    5.104031] RAX: 0000000000000003 RBX: ffffffffc0200000 RCX: 0000000000000000
[    5.104031] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffffffff9ed6e210
[    5.104031] RBP: ffff880018815008 R08: ffffffff9e344ec6 R09: 0000000000000001
[    5.104031] R10: ffff88001d06fc90 R11: 0000000000000b2c R12: 0000000000000000
[    5.104031] R13: 0000000000000063 R14: 0000000000000001 R15: ffff88001d06fd61
[    5.104031] FS:  0000000000000000(0000) GS:ffff88001d600000(0000) knlGS:0000000000000000
[    5.104031] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    5.104031] CR2: 0000000000000000 CR3: 0000000018812000 CR4: 00000000000406f0
[    5.104031] Call Trace:
[    5.104031]  ? 0xffffffffc01ff000
[    5.104031]  text_poke+0x4f/0x297:
						text_poke at arch/x86/kernel/alternative.c:709
[    5.104031]  ? 0xffffffffc01ff002
[    5.104031]  arch_copy_kprobe+0xf7/0x106:
						arch_copy_kprobe at arch/x86/kernel/kprobes/core.c:474
[    5.104031]  arch_prepare_kprobe+0x8c/0xc4:
						arch_prepare_kprobe at arch/x86/kernel/kprobes/core.c:491
[    5.104031]  register_kprobe+0x6a8/0x875:
						register_kprobe at kernel/kprobes.c:1567
[    5.104031]  ? do_early_param+0xb6/0xb6:
						repair_env_string at init/main.c:245
[    5.104031]  ? init_test_probes+0x49/0x4bb:
						test_kprobe at kernel/test_kprobes.c:69
						 (inlined by) init_test_probes at kernel/test_kprobes.c:377
[    5.104031]  init_test_probes+0x49/0x4bb:
						test_kprobe at kernel/test_kprobes.c:69
						 (inlined by) init_test_probes at kernel/test_kprobes.c:377
[    5.104031]  init_kprobes+0x276/0x281:
						init_kprobes at kernel/kprobes.c:2277
[    5.104031]  ? debugfs_kprobe_init+0xf7/0xf7:
						init_kprobes at kernel/kprobes.c:2225
[    5.104031]  do_one_initcall+0x99/0x1a0:
						do_one_initcall at init/main.c:826
[    5.104031]  ? do_early_param+0xb6/0xb6:
						repair_env_string at init/main.c:245
[    5.104031]  kernel_init_freeable+0x11e/0x1e8:
						do_initcall_level at init/main.c:891
						 (inlined by) do_initcalls at init/main.c:900
						 (inlined by) do_basic_setup at init/main.c:918
						 (inlined by) kernel_init_freeable at init/main.c:1066
[    5.104031]  ? rest_init+0x270/0x270:
						kernel_init at init/main.c:993
[    5.104031]  kernel_init+0x5/0x156:
						kernel_init at init/main.c:995
[    5.104031]  ret_from_fork+0x24/0x30:
						ret_from_fork at arch/x86/entry/entry_64.S:447
[    5.104031] Code: 9e 48 39 c8 49 89 c4 41 0f 95 c6 31 c9 31 d2 44 89 f6 e8 36 48 f3 ff 49 63 c6 48 83 c0 02 48 ff 04 c5 c8 3b f0 9e 4d 39 ec 74 02 <0f> ff 31 d2 31 c9 48 c7 c7 e0 e1 d6 9e 44 89 f6 e8 0d 48 f3 ff
[    5.104031] ---[ end trace 1e069188d28709ac ]---
[    5.193423] Kprobe smoke test: passed successfully

Attached the full dmesg, kconfig and reproduce scripts.

Thanks,
Fengguang

View attachment "dmesg-vm-kbuild-yocto-x86_64-46:20171129004730:x86_64-randconfig-r0-11282226:4.15.0-rc1:189" of type "text/plain" (43507 bytes)

View attachment ".config" of type "text/plain" (99674 bytes)

View attachment "job-script" of type "text/plain" (3875 bytes)

View attachment "reproduce-vm-kbuild-yocto-x86_64-46:20171129004730:x86_64-randconfig-r0-11282226:4.15.0-rc1:189" of type "text/plain" (2075 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ