lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20220504022511.GC30775@xsang-OptiPlex-9020>
Date:   Wed, 4 May 2022 10:25:11 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Zach O'Keefe <zokeefe@...gle.com>
Cc:     0day robot <lkp@...el.com>, LKML <linux-kernel@...r.kernel.org>,
        lkp@...ts.01.org, Alex Shi <alex.shi@...ux.alibaba.com>,
        David Hildenbrand <david@...hat.com>,
        David Rientjes <rientjes@...gle.com>,
        Matthew Wilcox <willy@...radead.org>,
        Michal Hocko <mhocko@...e.com>,
        Pasha Tatashin <pasha.tatashin@...een.com>,
        Peter Xu <peterx@...hat.com>, SeongJae Park <sj@...nel.org>,
        Song Liu <songliubraving@...com>,
        Vlastimil Babka <vbabka@...e.cz>,
        Yang Shi <shy828301@...il.com>, Zi Yan <ziy@...dia.com>,
        linux-mm@...ck.org, Andrea Arcangeli <aarcange@...hat.com>,
        Andrew Morton <akpm@...ux-foundation.org>,
        Arnd Bergmann <arnd@...db.de>,
        Axel Rasmussen <axelrasmussen@...gle.com>,
        Chris Kennelly <ckennelly@...gle.com>,
        Chris Zankel <chris@...kel.net>, Helge Deller <deller@....de>,
        Hugh Dickins <hughd@...gle.com>,
        Ivan Kokshaysky <ink@...assic.park.msu.ru>,
        "James E.J. Bottomley" <James.Bottomley@...senPartnership.com>,
        Jens Axboe <axboe@...nel.dk>,
        "Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>,
        Matt Turner <mattst88@...il.com>,
        Max Filippov <jcmvbkbc@...il.com>,
        Miaohe Lin <linmiaohe@...wei.com>,
        Minchan Kim <minchan@...nel.org>,
        Patrick Xia <patrickx@...gle.com>,
        Pavel Begunkov <asml.silence@...il.com>,
        Thomas Bogendoerfer <tsbogend@...ha.franken.de>,
        Zach O'Keefe <zokeefe@...gle.com>
Subject: [mm/khugepaged]  0d006aeaf9:
 BUG:unable_to_handle_page_fault_for_address



Greeting,

FYI, we noticed the following commit (built with gcc-11):

commit: 0d006aeaf99be94a0dcb727cb6540195f13fd9c3 ("[PATCH v4 04/13] mm/khugepaged: make hugepage allocation context-specific")
url: https://github.com/intel-lab-lkp/linux/commits/Zach-O-Keefe/mm-khugepaged-record-SCAN_PMD_MAPPED-when-scan_pmd-finds-THP/20220503-031727
patch link: https://lore.kernel.org/linux-mm/20220502181714.3483177-5-zokeefe@google.com

in testcase: boot

on test machine: qemu-system-i386 -enable-kvm -cpu SandyBridge -smp 2 -m 4G

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):



If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>


[   18.854835][   T17] BUG: unable to handle page fault for address: 003c24ca
[   18.855169][   T17] #PF: supervisor read access in kernel mode
[   18.855395][   T17] #PF: error_code(0x0000) - not-present page
[   18.855620][   T17] *pde = 00000000
[   18.855763][   T17] Oops: 0000 [#1]
[   18.855903][   T17] CPU: 0 PID: 17 Comm: khugepaged Not tainted 5.18.0-rc5-next-20220502-00004-g0d006aeaf99b #1
[ 18.856283][ T17] EIP: alloc_charge_hpage (mm/khugepaged.c:951 mm/khugepaged.c:1091) 
[ 18.856498][ T17] Code: 00 00 00 55 89 e5 6a 07 e8 86 c0 ff ff c9 31 d2 89 d1 c3 55 89 e5 a1 28 e6 fa 59 25 80 00 00 00 83 f8 01 19 c0 25 00 fc ff ff <8b> 80 ca 24 3c 00 85 c0 74 0f 8b 42 08 5d 8b 40 04 b8 01 00 00 00
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 55 89             	add    %dl,-0x77(%rbp)
   5:	e5 6a                	in     $0x6a,%eax
   7:	07                   	(bad)  
   8:	e8 86 c0 ff ff       	callq  0xffffffffffffc093
   d:	c9                   	leaveq 
   e:	31 d2                	xor    %edx,%edx
  10:	89 d1                	mov    %edx,%ecx
  12:	c3                   	retq   
  13:	55                   	push   %rbp
  14:	89 e5                	mov    %esp,%ebp
  16:	a1 28 e6 fa 59 25 80 	movabs 0x802559fae628,%eax
  1d:	00 00 
  1f:	00 83 f8 01 19 c0    	add    %al,-0x3fe6fe08(%rbx)
  25:	25 00 fc ff ff       	and    $0xfffffc00,%eax
  2a:*	8b 80 ca 24 3c 00    	mov    0x3c24ca(%rax),%eax		<-- trapping instruction
  30:	85 c0                	test   %eax,%eax
  32:	74 0f                	je     0x43
  34:	8b 42 08             	mov    0x8(%rdx),%eax
  37:	5d                   	pop    %rbp
  38:	8b 40 04             	mov    0x4(%rax),%eax
  3b:	b8 01 00 00 00       	mov    $0x1,%eax

Code starting with the faulting instruction
===========================================
   0:	8b 80 ca 24 3c 00    	mov    0x3c24ca(%rax),%eax
   6:	85 c0                	test   %eax,%eax
   8:	74 0f                	je     0x19
   a:	8b 42 08             	mov    0x8(%rdx),%eax
   d:	5d                   	pop    %rbp
   e:	8b 40 04             	mov    0x4(%rax),%eax
  11:	b8 01 00 00 00       	mov    $0x1,%eax
[   18.857217][   T17] EAX: 00000000 EBX: 41172400 ECX: 00000000 EDX: 411d1f7c
[   18.857487][   T17] ESI: 411d1f7c EDI: 4117245c EBP: 411d1e64 ESP: 411d1e64
[   18.857750][   T17] DS: 007b ES: 007b FS: 0000 GS: 0000 SS: 0068 EFLAGS: 00010246
[   18.858036][   T17] CR0: 80050033 CR2: 003c24ca CR3: 112f3000 CR4: 000406d0
[   18.858302][   T17] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[   18.858567][   T17] DR6: fffe0ff0 DR7: 00000400
[   18.858743][   T17] Call Trace:
[ 18.858871][ T17] ? collapse_huge_page (mm/khugepaged.c:1109) 
[ 18.859066][ T17] ? find_held_lock (kernel/locking/lockdep.c:5156) 
[ 18.859245][ T17] ? khugepaged_scan_pmd (mm/khugepaged.c:1400) 
[ 18.859446][ T17] ? khugepaged_scan_mm_slot (mm/khugepaged.c:2216) 
[ 18.859657][ T17] ? khugepaged_do_scan (mm/khugepaged.c:2290) 
[ 18.859854][ T17] ? khugepaged (mm/khugepaged.c:2340) 
[ 18.860016][ T17] ? khugepaged_defrag_show (mm/khugepaged.c:1076) 
[ 18.860219][ T17] ? kthread (kernel/kthread.c:376) 
[ 18.860374][ T17] ? khugepaged_do_scan (mm/khugepaged.c:2328) 
[ 18.860570][ T17] ? kthread_complete_and_exit (kernel/kthread.c:331) 
[ 18.860781][ T17] ? ret_from_fork (arch/x86/entry/entry_32.S:772) 
[   18.860956][   T17] Modules linked in:
[   18.861105][   T17] CR2: 00000000003c24ca
[   18.861262][   T17] ---[ end trace 0000000000000000 ]---
[ 18.861263][ T17] EIP: alloc_charge_hpage (mm/khugepaged.c:951 mm/khugepaged.c:1091) 
[ 18.861266][ T17] Code: 00 00 00 55 89 e5 6a 07 e8 86 c0 ff ff c9 31 d2 89 d1 c3 55 89 e5 a1 28 e6 fa 59 25 80 00 00 00 83 f8 01 19 c0 25 00 fc ff ff <8b> 80 ca 24 3c 00 85 c0 74 0f 8b 42 08 5d 8b 40 04 b8 01 00 00 00
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 55 89             	add    %dl,-0x77(%rbp)
   5:	e5 6a                	in     $0x6a,%eax
   7:	07                   	(bad)  
   8:	e8 86 c0 ff ff       	callq  0xffffffffffffc093
   d:	c9                   	leaveq 
   e:	31 d2                	xor    %edx,%edx
  10:	89 d1                	mov    %edx,%ecx
  12:	c3                   	retq   
  13:	55                   	push   %rbp
  14:	89 e5                	mov    %esp,%ebp
  16:	a1 28 e6 fa 59 25 80 	movabs 0x802559fae628,%eax
  1d:	00 00 
  1f:	00 83 f8 01 19 c0    	add    %al,-0x3fe6fe08(%rbx)
  25:	25 00 fc ff ff       	and    $0xfffffc00,%eax
  2a:*	8b 80 ca 24 3c 00    	mov    0x3c24ca(%rax),%eax		<-- trapping instruction
  30:	85 c0                	test   %eax,%eax
  32:	74 0f                	je     0x43
  34:	8b 42 08             	mov    0x8(%rdx),%eax
  37:	5d                   	pop    %rbp
  38:	8b 40 04             	mov    0x4(%rax),%eax
  3b:	b8 01 00 00 00       	mov    $0x1,%eax

Code starting with the faulting instruction
===========================================
   0:	8b 80 ca 24 3c 00    	mov    0x3c24ca(%rax),%eax
   6:	85 c0                	test   %eax,%eax
   8:	74 0f                	je     0x19
   a:	8b 42 08             	mov    0x8(%rdx),%eax
   d:	5d                   	pop    %rbp
   e:	8b 40 04             	mov    0x4(%rax),%eax
  11:	b8 01 00 00 00       	mov    $0x1,%eax


To reproduce:

        # build kernel
	cd linux
	cp config-5.18.0-rc5-next-20220502-00004-g0d006aeaf99b .config
	make HOSTCC=gcc-11 CC=gcc-11 ARCH=i386 olddefconfig prepare modules_prepare bzImage modules
	make HOSTCC=gcc-11 CC=gcc-11 ARCH=i386 INSTALL_MOD_PATH=<mod-install-dir> modules_install
	cd <mod-install-dir>
	find lib/ | cpio -o -H newc --quiet | gzip > modules.cgz


        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> -m modules.cgz job-script # job-script is attached in this email

        # if come across any failure that blocks the test,
        # please remove ~/.lkp and /lkp dir to run from a clean state.



-- 
0-DAY CI Kernel Test Service
https://01.org/lkp



View attachment "config-5.18.0-rc5-next-20220502-00004-g0d006aeaf99b" of type "text/plain" (145551 bytes)

View attachment "job-script" of type "text/plain" (4782 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (15036 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ