lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 24 Sep 2020 08:22:27 +0800
From:   Alex Shi <alex.shi@...ux.alibaba.com>
To:     linux-kernel@...r.kernel.org, linux-mm@...ck.org
Cc:     akpm@...ux-foundation.org
Subject: Re: a bug on 5.9-rc6


在 2020/9/22 下午10:03, Alex Shi 写道:
> 
> I just found a bug on recent upstream kernel on my x86 box.
> 	325d0eab4f31 Merge branch 'akpm' (patches from Andrew)
> The last good kernel I known is 5.9-rc2.


This bug still exist on 5.9-rc6.

I found it in doing stress kernel build on swapping, while run
kernel selftest's vmtest like:
	for ((i=0;i<8000;i++)); do ./run_vmtests ; sleep 1; done

It take time.
I will try to do bisect when things down in hands.

Thanks
Alex
> 
> Thanks
> Alex
> 
> Linux aliy8 5.9.0-rc5-00156-g325d0eab4f31 #88 SMP PREEMPT Mon Sep 21 08:48:19 CST 2020 x86_64 x86_64 x86_64 GNU/Linux
> 
>  1841.488609] BUG: Bad page state in process userfaultfd  pfn:1a7d7
> [ 1841.494930] page:00000000ec5d2f1e refcount:0 mapcount:0 mapping:0000000000000000 index:0x7fd6181a6 pfn:0x1a7d7
> [ 1841.505080] flags: 0xfffffc0080004(uptodate|swapbacked)
> [ 1841.510427] raw: 000fffffc0080004 dead000000000100 dead000000000122 0000000000000000
> [ 1841.518318] raw: 00000007fd6181a6 0000000000000000 00000000ffffffff 0000000000000000
> [ 1841.526207] page dumped because: PAGE_FLAGS_CHECK_AT_FREE flag(s) set
> [ 1841.532775] Modules linked in: loop xt_addrtype br_netfilter xt_CHECKSUM iptable_mangle xt_MASQUERADE iptable_nat nf_nat xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c ipt_REJECT nf_reject_ipv4 tun bridge stp llc overlay ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter dm_mirror dm_region_hash dm_log dm_mod ipmi_ssif intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal coretemp kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel glue_helper crypto_simd cryptd pcspkr i2c_i801 joydev i2c_smbus mei_me mei ipmi_si ipmi_devintf ipmi_msghandler ip_tables ext4 mbcache jbd2 crc32c_intel drm_vram_helper drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm_ttm_helper ttm drm ahci libahci libata virtio_net net_failover failover
> [ 1841.603813] CPU: 0 PID: 26221 Comm: userfaultfd Kdump: loaded Tainted: G S  B   W         5.9.0-rc5-00156-g325d0eab4f31 #88
> [ 1841.615080] Hardware name: Alibaba X-Dragon CN 01/20G4B, BIOS 1ALSP017 04/09/2019
> [ 1841.622701] Call Trace:
> [ 1841.625280]  dump_stack+0x8d/0xc0
> [ 1841.628726]  bad_page.cold.130+0x63/0x93
> [ 1841.632776]  free_pcp_prepare+0x20b/0x250
> [ 1841.636908]  free_unref_page+0x18/0x90
> [ 1841.640780]  wp_page_copy+0x2cd/0x5d0
> [ 1841.644569]  __handle_mm_fault+0x791/0x7a0
> [ 1841.648790]  ? handle_mm_fault+0x4b/0x3f0
> [ 1841.652925]  handle_mm_fault+0x16f/0x3f0
> [ 1841.656968]  exc_page_fault+0x3cb/0x6a0
> [ 1841.660920]  ? asm_exc_page_fault+0x8/0x30
> [ 1841.665131]  asm_exc_page_fault+0x1e/0x30
> [ 1841.669259] RIP: 0033:0x7fd625da6d5d
> [ 1841.672957] Code: 00 00 89 77 10 89 f2 49 8d 70 16 4c 89 c7 81 e2 80 00 00 00 e9 04 6c 00 00 0f 1f 40 00 81 e6 80 00 00 00 bf 01 00 00 00 31 c0 <f0> 41 0f b1 38 0f 85 24 01 00 00 64 8b 04 25 d0 02 00 00 41 89 40
> [ 1841.691889] RSP: 002b:00007fd6147b2e58 EFLAGS: 00010246
> [ 1841.697239] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000000027da
> [ 1841.704497] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001
> [ 1841.711759] RBP: 00007fd6147b2f10 R08: 00007fd6181a6000 R09: 00007fd6147b2eb0
> [ 1841.719028] R10: 000000000000000f R11: 0000000000000206 R12: 0000000000000000
> [ 1841.726286] R13: 0000000001001000 R14: 0000000000000000 R15: 00007fd6147b3700
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ