lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 5 Feb 2018 12:58:08 +0800
From:   kernel test robot <xiaolong.ye@...el.com>
To:     daniel.m.jordan@...cle.com
Cc:     linux-mm@...ck.org, linux-kernel@...r.kernel.org,
        aaron.lu@...el.com, ak@...ux.intel.com, akpm@...ux-foundation.org,
        Dave.Dice@...cle.com, dave@...olabs.net,
        khandual@...ux.vnet.ibm.com, ldufour@...ux.vnet.ibm.com,
        mgorman@...e.de, mhocko@...nel.org, pasha.tatashin@...cle.com,
        steven.sistare@...cle.com, yossi.lev@...cle.com, lkp@...org
Subject: [lkp-robot] [mm]  44b163e12f: kernel_BUG_at_mm/swap.c


FYI, we noticed the following commit (built with gcc-7):

commit: 44b163e12fd4a133016482d94ad11d8f3365ddd2 ("mm: split up release_pages into non-sentinel and sentinel passes")
url: https://github.com/0day-ci/linux/commits/daniel-m-jordan-oracle-com/mm-add-a-percpu_pagelist_batch-sysctl-interface/20180202-131129


in testcase: boot

on test machine: qemu-system-i386 -enable-kvm -m 360M

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):


+-----------------------------------------------------+------------+------------+
|                                                     | 6fe15c1d7a | 44b163e12f |
+-----------------------------------------------------+------------+------------+
| boot_successes                                      | 0          | 0          |
| boot_failures                                       | 46         | 12         |
| WARNING:possible_recursive_locking_detected         | 46         | 12         |
| WARNING:at_arch/x86/mm/dump_pagetables.c:#note_page | 8          | 2          |
| EIP:note_page                                       | 8          | 2          |
| kernel_BUG_at_mm/swap.c                             | 0          | 12         |
| invalid_opcode:#[##]                                | 0          | 12         |
| EIP:release_pages                                   | 0          | 12         |
| Kernel_panic-not_syncing:Fatal_exception            | 0          | 12         |
+-----------------------------------------------------+------------+------------+



[  245.413373] kernel BUG at mm/swap.c:754!
[  245.424199] invalid opcode: 0000 [#1] SMP
[  245.432437] CPU: 0 PID: 164 Comm: sh Not tainted 4.15.0-00012-g44b163e #153
[  245.445522] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014
[  245.461052] EIP: release_pages+0x26/0x3ab
[  245.468947] EFLAGS: 00010202 CPU: 0
[  245.476401] EAX: c9c6200c EBX: c9c62000 ECX: c9c6dd80 EDX: 00000297
[  245.490767] ESI: 00000000 EDI: c9c6de3c EBP: c9c6ddd8 ESP: c9c6dd64
[  245.502693]  DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
[  245.513095] CR0: 80050033 CR2: 08138000 CR3: 0c9c0220 CR4: 000006b0
[  245.524953] Call Trace:
[  245.530908]  ? cpumask_next+0x21/0x24
[  245.537234]  ? cpumask_any_but+0x1d/0x2d
[  245.544004]  ? flush_tlb_mm_range+0xcc/0x103
[  245.552467]  tlb_flush_mmu_free+0x17/0x33
[  245.560820]  tlb_flush_mmu+0x12/0x15
[  245.568370]  arch_tlb_finish_mmu+0x28/0x47
[  245.575761]  tlb_finish_mmu+0x1d/0x2c
[  245.582080]  exit_mmap+0xbc/0x10c
[  245.588629]  ? trace_hardirqs_off_caller+0x1b/0x99
[  245.598128]  mmput+0x53/0xc1
[  245.604470]  flush_old_exec+0x59f/0x60e
[  245.612514]  load_elf_binary+0x238/0x9d4
[  245.620644]  ? search_binary_handler+0x5c/0xbe
[  245.629747]  ? search_binary_handler+0x5c/0xbe
[  245.638823]  search_binary_handler+0x50/0xbe
[  245.647474]  do_execveat_common+0x545/0x7af
[  245.656070]  do_execve+0x14/0x16
[  245.663265]  SyS_execve+0x16/0x18
[  245.670448]  do_fast_syscall_32+0x11b/0x222
[  245.679075]  entry_SYSENTER_32+0x53/0x86
[  245.687212] EIP: 0xb7eecbe5
[  245.693652] EFLAGS: 00000292 CPU: 0
[  245.701007] EAX: ffffffda EBX: 08138028 ECX: 081382a8 EDX: 08136008
[  245.712423] ESI: 081382a8 EDI: b7ebbff4 EBP: 00000000 ESP: bfb82ed4
[  245.723085]  DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b
[  245.733522] Code: 7c f1 ff 5d c3 55 89 e5 57 56 53 83 ec 68 8d 4d a8 65 8b 35 14 00 00 00 89 75 f0 31 f6 81 fa 00 02 00 00 89 4d a8 89 4d ac 7e 02 <0f> 0b 8d 4a 1f c1 e9 05 c1 e1 02 83 f9 40 89 55 94 89 45 8c 76
[  245.767993] EIP: release_pages+0x26/0x3ab SS:ESP: 0068:c9c6dd64
[  245.779532] ---[ end trace 9116e5f455646a7b ]---


To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> job-script  # job-script is attached in this email



Thanks,
Xiaolong

View attachment "config-4.15.0-00012-g44b163e" of type "text/plain" (119165 bytes)

View attachment "job-script" of type "text/plain" (4035 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (17896 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ