lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20201206140750.GA19216@xsang-OptiPlex-9020>
Date:   Sun, 6 Dec 2020 22:07:50 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Hailong Liu <liu.hailong6@....com.cn>
Cc:     Stephen Rothwell <sfr@...b.auug.org.au>,
        Mike Rapoport <rppt@...nel.org>,
        Andrew Morton <akpm@...ux-foundation.org>,
        LKML <linux-kernel@...r.kernel.org>,
        Linux Memory Management List <linux-mm@...ck.org>,
        lkp@...ts.01.org, lkp@...el.com
Subject: [mm/memblock]  4df001639c: kernel_BUG_at_mm/page_alloc.c


Greeting,

FYI, we noticed the following commit (built with gcc-9):

commit: 4df001639c843ba69176833ddc6cc2631db8a2ab ("mm/memblock: use a more appropriate order calculation when free memblock pages")
https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master


in testcase: locktorture
version: 
with following parameters:

	runtime: 300s
	test: cpuhotplug

test-description: This torture test consists of creating a number of kernel threads which acquire the lock and hold it for specific amount of time, thus simulating different critical region behaviors.
test-url: https://www.kernel.org/doc/Documentation/locking/locktorture.txt


on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 8G

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):


+---------------------------------------------------------+------------+------------+
|                                                         | 15172221fb | 4df001639c |
+---------------------------------------------------------+------------+------------+
| boot_successes                                          | 14         | 0          |
| kernel_BUG_at_mm/page_alloc.c                           | 0          | 28         |
| invalid_opcode:#[##]                                    | 0          | 28         |
| EIP:__free_one_page                                     | 0          | 28         |
| Kernel_panic-not_syncing:Fatal_exception                | 0          | 28         |
+---------------------------------------------------------+------------+------------+


If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>


[    0.189907] kernel BUG at mm/page_alloc.c:1008!
[    0.190545] invalid opcode: 0000 [#1]
[    0.191052] CPU: 0 PID: 0 Comm: swapper Not tainted 5.10.0-rc6-00271-g4df001639c84 #1
[    0.192125] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[    0.193240] EIP: __free_one_page+0x3c4/0x490
[    0.193810] Code: dc b7 c2 89 f8 e8 3c 5a fe ff 0f 0b 8d b4 26 00 00 00 00 8d 76 00 0f 0b 8d b6 00 00 00 00 ba 90 dc b7 c2 89 f8 e8 1c 5a fe ff <0f> 0b 8d b4 26 00 00 00 00 8d 76 00 8b 55 f0 01 82 04 03 00 00 01
[    0.196288] EAX: c2b7cd9e EBX: c32a7840 ECX: 00000000 EDX: c2b7dc90
[    0.197169] ESI: 00000011 EDI: d7d3d220 EBP: c2dd3ea0 ESP: c2dd3e80
[    0.198027] DS: 007b ES: 007b FS: 0000 GS: 0000 SS: 0068 EFLAGS: 00210002
[    0.198964] CR0: 80050033 CR2: 00000000 CR3: 03429000 CR4: 000406b0
[    0.199829] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[    0.200701] DR6: fffe0ff0 DR7: 00000400
[    0.201189] Call Trace:
[    0.201497]  free_one_page+0x44/0xc0
[    0.201948]  __free_pages_ok+0x16f/0x4e0
[    0.202478]  __free_pages_core+0xa6/0xe0
[    0.203001]  memblock_free_pages+0xf/0x11
[    0.203479]  memblock_free_all+0x11c/0x16e
[    0.203989]  mem_init+0x20/0x100
[    0.204422]  start_kernel+0x384/0x5ac
[    0.204919]  ? set_intr_gate+0x3b/0x3d
[    0.205382]  ? early_idt_handler_common+0x44/0x44
[    0.205990]  i386_start_kernel+0x47/0x49
[    0.206481]  startup_32_smp+0x164/0x168
[    0.206985] Modules linked in:
[    0.207413] random: get_random_bytes called from print_oops_end_marker+0x2c/0x50 with crng_init=0
[    0.207417] ---[ end trace 4bc0c53f48cce3f8 ]---


To reproduce:

        # build kernel
	cd linux
	cp config-5.10.0-rc6-00271-g4df001639c84 .config
	make HOSTCC=gcc-9 CC=gcc-9 ARCH=i386 olddefconfig prepare modules_prepare bzImage modules
	make HOSTCC=gcc-9 CC=gcc-9 ARCH=i386 INSTALL_MOD_PATH=<mod-install-dir> modules_install
	cd <mod-install-dir>
	find lib/ | cpio -o -H newc --quiet | gzip > modules.cgz


        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> -m modules.cgz job-script # job-script is attached in this email



Thanks,
Oliver Sang


View attachment "config-5.10.0-rc6-00271-g4df001639c84" of type "text/plain" (138630 bytes)

View attachment "job-script" of type "text/plain" (4466 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (4552 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ