lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20210627143859.GD17986@xsang-OptiPlex-9020>
Date:   Sun, 27 Jun 2021 22:38:59 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Hui Wang <hui.wang@...onical.com>
Cc:     0day robot <lkp@...el.com>, Bjorn Helgaas <bhelgaas@...gle.com>,
        Yinghai Lu <yinghai@...nel.org>,
        Ingo Molnar <mingo@...hat.com>,
        "Rafael J. Wysocki" <rafael.j.wysocki@...el.com>,
        LKML <linux-kernel@...r.kernel.org>, lkp@...ts.01.org,
        linux-pci@...r.kernel.org, linux-acpi@...r.kernel.org,
        hui.wang@...onical.com
Subject: [x86/PCI]  9d65c2929f: BUG:unable_to_handle_page_fault_for_address



Greeting,

FYI, we noticed the following commit (built with gcc-9):

commit: 9d65c2929f9659438963254f1f96af2e91021b21 ("[PATCH] x86/PCI: Conditionally add a non-e820 mapped window to root bridge")
url: https://github.com/0day-ci/linux/commits/Hui-Wang/x86-PCI-Conditionally-add-a-non-e820-mapped-window-to-root-bridge/20210624-175600
base: https://git.kernel.org/cgit/linux/kernel/git/helgaas/pci.git next

in testcase: will-it-scale
version: will-it-scale-x86_64-a34a85c-1_20210620
with following parameters:

	nr_task: 16
	mode: thread
	test: pwrite1
	cpufreq_governor: performance
	ucode: 0x16

test-description: Will It Scale takes a testcase and runs it from 1 through to n parallel copies to see if the testcase will scale. It builds both a process and threads based test in order to see any differences between the two.
test-url: https://github.com/antonblanchard/will-it-scale


on test machine: 144 threads 4 sockets Intel(R) Xeon(R) CPU E7-8890 v3 @ 2.50GHz with 512G memory

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):



If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>


[   10.903693] BUG: unable to handle page fault for address: 0000000700000006
[   10.904665] #PF: supervisor read access in kernel mode
[   10.904665] #PF: error_code(0x0000) - not-present page
[   10.904665] PGD 0 P4D 0
[   10.904665] Oops: 0000 [#1] SMP PTI
[   10.904665] CPU: 77 PID: 1 Comm: swapper/0 Not tainted 5.13.0-rc1-00050-g9d65c2929f96 #1
[   10.904665] Hardware name: Intel Corporation BRICKLAND/BRICKLAND, BIOS BRHSXSD1.86B.0067.R02.1507221722 07/22/2015
[   10.904665] RIP: 0010:iomem_map_sanity_check (kernel/resource.c:1675) 
[ 10.904665] Code: b5 5a 83 53 49 01 ee 48 89 eb 4d 8d 6e ff 48 c1 eb 0c 4d 89 ec e8 50 9d c0 00 48 8b 3d 21 72 75 01 49 c1 ec 0c 48 85 ff 74 3e <48> 8b 07 4c 39 f0 73 25 48 8b 57 08 48 39 ea 72 1c 48 c1 e8 0c 48
All code
========
   0:	b5 5a                	mov    $0x5a,%ch
   2:	83 53 49 01          	adcl   $0x1,0x49(%rbx)
   6:	ee                   	out    %al,(%dx)
   7:	48 89 eb             	mov    %rbp,%rbx
   a:	4d 8d 6e ff          	lea    -0x1(%r14),%r13
   e:	48 c1 eb 0c          	shr    $0xc,%rbx
  12:	4d 89 ec             	mov    %r13,%r12
  15:	e8 50 9d c0 00       	callq  0xc09d6a
  1a:	48 8b 3d 21 72 75 01 	mov    0x1757221(%rip),%rdi        # 0x1757242
  21:	49 c1 ec 0c          	shr    $0xc,%r12
  25:	48 85 ff             	test   %rdi,%rdi
  28:	74 3e                	je     0x68
  2a:*	48 8b 07             	mov    (%rdi),%rax		<-- trapping instruction
  2d:	4c 39 f0             	cmp    %r14,%rax
  30:	73 25                	jae    0x57
  32:	48 8b 57 08          	mov    0x8(%rdi),%rdx
  36:	48 39 ea             	cmp    %rbp,%rdx
  39:	72 1c                	jb     0x57
  3b:	48 c1 e8 0c          	shr    $0xc,%rax
  3f:	48                   	rex.W

Code starting with the faulting instruction
===========================================
   0:	48 8b 07             	mov    (%rdi),%rax
   3:	4c 39 f0             	cmp    %r14,%rax
   6:	73 25                	jae    0x2d
   8:	48 8b 57 08          	mov    0x8(%rdi),%rdx
   c:	48 39 ea             	cmp    %rbp,%rdx
   f:	72 1c                	jb     0x2d
  11:	48 c1 e8 0c          	shr    $0xc,%rax
  15:	48                   	rex.W
[   10.904665] RSP: 0000:ffffc90000037d50 EFLAGS: 00010206
[   10.904665] RAX: 0000000700000006 RBX: 0000000000074608 RCX: ffff888100000008
[   10.904665] RDX: 0000000073becfff RSI: 00000000000033be RDI: 0000000700000006
[   10.904665] RBP: 0000000074608000 R08: ffff88810e3e4e80 R09: 8000000000000063
[   10.904665] R10: 0000000000004000 R11: 000000010e4be067 R12: 000000000007460b
[   10.904665] R13: 000000007460b3bd R14: 000000007460b3be R15: ffffffff812b3e6e
[   10.904665] FS:  0000000000000000(0000) GS:ffff889fff9c0000(0000) knlGS:0000000000000000
[   10.904665] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   10.904665] CR2: 0000000700000006 CR3: 000000807e20a001 CR4: 00000000001706e0
[   10.904665] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   10.904665] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   10.904665] Call Trace:
[   10.904665] __ioremap_caller (arch/x86/mm/ioremap.c:292) 
[   10.904665] memremap (kernel/iomem.c:112) 
[   10.904665] dmi_init (drivers/firmware/dmi_scan.c:776) 
[   10.904665] ? count_mem_devices (drivers/firmware/dmi_scan.c:755) 
[   10.904665] do_one_initcall (init/main.c:1249) 
[   10.904665] kernel_init_freeable (init/main.c:1321 init/main.c:1338 init/main.c:1358 init/main.c:1560) 
[   10.904665] ? rest_init (init/main.c:1444) 
[   10.904665] kernel_init (init/main.c:1449) 
[   10.904665] ret_from_fork (arch/x86/entry/entry_64.S:300) 
[   10.904665] Modules linked in:
[   10.904665] CR2: 0000000700000006
[   10.904665] ---[ end trace 72747cfc734ae856 ]---
[   10.904665] RIP: 0010:iomem_map_sanity_check (kernel/resource.c:1675) 
[ 10.904665] Code: b5 5a 83 53 49 01 ee 48 89 eb 4d 8d 6e ff 48 c1 eb 0c 4d 89 ec e8 50 9d c0 00 48 8b 3d 21 72 75 01 49 c1 ec 0c 48 85 ff 74 3e <48> 8b 07 4c 39 f0 73 25 48 8b 57 08 48 39 ea 72 1c 48 c1 e8 0c 48
All code
========
   0:	b5 5a                	mov    $0x5a,%ch
   2:	83 53 49 01          	adcl   $0x1,0x49(%rbx)
   6:	ee                   	out    %al,(%dx)
   7:	48 89 eb             	mov    %rbp,%rbx
   a:	4d 8d 6e ff          	lea    -0x1(%r14),%r13
   e:	48 c1 eb 0c          	shr    $0xc,%rbx
  12:	4d 89 ec             	mov    %r13,%r12
  15:	e8 50 9d c0 00       	callq  0xc09d6a
  1a:	48 8b 3d 21 72 75 01 	mov    0x1757221(%rip),%rdi        # 0x1757242
  21:	49 c1 ec 0c          	shr    $0xc,%r12
  25:	48 85 ff             	test   %rdi,%rdi
  28:	74 3e                	je     0x68
  2a:*	48 8b 07             	mov    (%rdi),%rax		<-- trapping instruction
  2d:	4c 39 f0             	cmp    %r14,%rax
  30:	73 25                	jae    0x57
  32:	48 8b 57 08          	mov    0x8(%rdi),%rdx
  36:	48 39 ea             	cmp    %rbp,%rdx
  39:	72 1c                	jb     0x57
  3b:	48 c1 e8 0c          	shr    $0xc,%rax
  3f:	48                   	rex.W

Code starting with the faulting instruction
===========================================
   0:	48 8b 07             	mov    (%rdi),%rax
   3:	4c 39 f0             	cmp    %r14,%rax
   6:	73 25                	jae    0x2d
   8:	48 8b 57 08          	mov    0x8(%rdi),%rdx
   c:	48 39 ea             	cmp    %rbp,%rdx
   f:	72 1c                	jb     0x2d
  11:	48 c1 e8 0c          	shr    $0xc,%rax
  15:	48                   	rex.W


To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp install                job.yaml  # job file is attached in this email
        bin/lkp split-job --compatible job.yaml  # generate the yaml file for lkp run
        bin/lkp run                    generated-yaml-file



---
0DAY/LKP+ Test Infrastructure                   Open Source Technology Center
https://lists.01.org/hyperkitty/list/lkp@lists.01.org       Intel Corporation

Thanks,
Oliver Sang


View attachment "config-5.13.0-rc1-00050-g9d65c2929f96" of type "text/plain" (174118 bytes)

View attachment "job-script" of type "text/plain" (8343 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (15336 bytes)

View attachment "job.yaml" of type "text/plain" (5273 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ