lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Fri, 22 Apr 2022 21:12:09 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Mike Snitzer <snitzer@...nel.org>
Cc:     LKML <linux-kernel@...r.kernel.org>,
        Linux Memory Management List <linux-mm@...ck.org>,
        lkp@...ts.01.org, lkp@...el.com
Subject: [dm]  9196856f66: canonical_address#:#[##]



Greeting,

FYI, we noticed the following commit (built with gcc-9):

commit: 9196856f66fdc9c82154929e92911b55797dd3bf ("dm: conditionally enable BIOSET_PERCPU_CACHE for dm_io bioset")
https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master

in testcase: xfstests
version: xfstests-x86_64-46e1b83-1_20220414
with following parameters:

	disk: 4HDD
	fs: xfs
	test: xfs-group-26
	ucode: 0x21

test-description: xfstests is a regression test suite for xfs and other files ystems.
test-url: git://git.kernel.org/pub/scm/fs/xfs/xfstests-dev.git


on test machine: 4 threads 1 sockets Intel(R) Core(TM) i3-3220 CPU @ 3.30GHz with 8G memory

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):



If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>


[   96.198975][ T5375] xfs filesystem being mounted at /fs/scratch supports timestamps until 2038 (0x7fffffff)
[   96.216203][ T5384] XFS (dm-0): Unmounting Filesystem
[   96.293908][ T5389] XFS (dm-0): Mounting V5 Filesystem
[   96.409627][ T5389] XFS (dm-0): Ending clean mount
[   96.416246][ T5389] xfs filesystem being mounted at /fs/scratch supports timestamps until 2038 (0x7fffffff)
[  102.716360][ T5514] general protection fault, probably for non-canonical address 0xfbd59c0000000024: 0000 [#1] SMP KASAN PTI
[  102.727760][ T5514] KASAN: maybe wild-memory-access in range [0xdead000000000120-0xdead000000000127]
[  102.736956][ T5514] CPU: 2 PID: 5514 Comm: dmsetup Not tainted 5.18.0-rc3-00045-g9196856f66fd #1
[  102.745843][ T5514] Hardware name: Hewlett-Packard HP Pro 3340 MT/17A1, BIOS 8.07 01/24/2013
[ 102.754431][ T5514] RIP: 0010:__cpuhp_state_remove_instance (kbuild/src/consumer/include/linux/list.h:848 kbuild/src/consumer/include/linux/list.h:862 kbuild/src/consumer/kernel/cpu.c:2140) 
[ 102.761128][ T5514] Code: 00 fc ff df 4c 89 ea 48 c1 ea 03 80 3c 02 00 0f 85 7f 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b 63 08 4c 89 e2 48 c1 ea 03 <80> 3c 02 00 0f 85 77 01 00 00 49 89 2c 24 48 85 ed 74 23 48 b8 00
All code
========
   0:	00 fc                	add    %bh,%ah
   2:	ff                   	(bad)  
   3:	df 4c 89 ea          	fisttps -0x16(%rcx,%rcx,4)
   7:	48 c1 ea 03          	shr    $0x3,%rdx
   b:	80 3c 02 00          	cmpb   $0x0,(%rdx,%rax,1)
   f:	0f 85 7f 01 00 00    	jne    0x194
  15:	48 b8 00 00 00 00 00 	movabs $0xdffffc0000000000,%rax
  1c:	fc ff df 
  1f:	4c 8b 63 08          	mov    0x8(%rbx),%r12
  23:	4c 89 e2             	mov    %r12,%rdx
  26:	48 c1 ea 03          	shr    $0x3,%rdx
  2a:*	80 3c 02 00          	cmpb   $0x0,(%rdx,%rax,1)		<-- trapping instruction
  2e:	0f 85 77 01 00 00    	jne    0x1ab
  34:	49 89 2c 24          	mov    %rbp,(%r12)
  38:	48 85 ed             	test   %rbp,%rbp
  3b:	74 23                	je     0x60
  3d:	48                   	rex.W
  3e:	b8                   	.byte 0xb8
	...

Code starting with the faulting instruction
===========================================
   0:	80 3c 02 00          	cmpb   $0x0,(%rdx,%rax,1)
   4:	0f 85 77 01 00 00    	jne    0x181
   a:	49 89 2c 24          	mov    %rbp,(%r12)
   e:	48 85 ed             	test   %rbp,%rbp
  11:	74 23                	je     0x36
  13:	48                   	rex.W
  14:	b8                   	.byte 0xb8
	...
[  102.780744][ T5514] RSP: 0018:ffffc9000082fab0 EFLAGS: 00010a06
[  102.786779][ T5514] RAX: dffffc0000000000 RBX: ffff8881341b0378 RCX: ffffffff83549c9f
[  102.794663][ T5514] RDX: 1bd5a00000000024 RSI: 0000000000000008 RDI: ffffc9000082fa50
[  102.802553][ T5514] RBP: dead000000000100 R08: 0000000000000001 R09: fffff52000105f4b
[  102.810458][ T5514] R10: ffffc9000082fa57 R11: fffff52000105f4a R12: dead000000000122
[  102.818386][ T5514] R13: ffff8881341b0380 R14: dffffc0000000000 R15: ffff8881341b0200
[  102.826273][ T5514] FS:  00007fb6f6ab8880(0000) GS:ffff8881a8100000(0000) knlGS:0000000000000000
[  102.835175][ T5514] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  102.841682][ T5514] CR2: 00007fb6f6d61649 CR3: 00000001260c8002 CR4: 00000000001706e0
[  102.849571][ T5514] Call Trace:
[  102.852742][ T5514]  <TASK>
[ 102.855603][ T5514] bioset_exit (kbuild/src/consumer/block/bio.c:718 kbuild/src/consumer/block/bio.c:1664) 
[ 102.859879][ T5514] ? __mutex_unlock_slowpath+0x300/0x300 
[ 102.866063][ T5514] dm_swap_table (kbuild/src/consumer/drivers/md/dm.c:1972 kbuild/src/consumer/drivers/md/dm.c:2043 kbuild/src/consumer/drivers/md/dm.c:2431) dm_mod
[ 102.871372][ T5514] ? dm_destroy_immediate (kbuild/src/consumer/drivers/md/dm.c:2399) dm_mod


To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        sudo bin/lkp install job.yaml           # job file is attached in this email
        bin/lkp split-job --compatible job.yaml # generate the yaml file for lkp run
        sudo bin/lkp run generated-yaml-file

        # if come across any failure that blocks the test,
        # please remove ~/.lkp and /lkp dir to run from a clean state.



-- 
0-DAY CI Kernel Test Service
https://01.org/lkp



View attachment "config-5.18.0-rc3-00045-g9196856f66fd" of type "text/plain" (165905 bytes)

View attachment "job-script" of type "text/plain" (5824 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (6892 bytes)

View attachment "xfstests" of type "text/plain" (25957 bytes)

View attachment "job.yaml" of type "text/plain" (4975 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ