lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <YsGcfNBgXYlnHDng@xsang-OptiPlex-9020>
Date:   Sun, 3 Jul 2022 21:41:16 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Sewook Seo <ssewook@...il.com>
Cc:     0day robot <lkp@...el.com>,
        Maciej Żenczykowski <maze@...gle.com>,
        Eric Dumazet <edumazet@...gle.com>,
        Steffen Klassert <steffen.klassert@...unet.com>,
        Sehee Lee <seheele@...gle.com>,
        LKML <linux-kernel@...r.kernel.org>, netdev@...r.kernel.org,
        lkp@...ts.01.org, guobing.chen@...el.com, ming.a.chen@...el.com,
        frank.du@...el.com, Shuhua.Fan@...el.com, wangyang.guo@...el.com,
        Wenhuan.Huang@...el.com, jessica.ji@...el.com, shan.kang@...el.com,
        guangli.li@...el.com, tiejun.li@...el.com, yu.ma@...el.com,
        dapeng1.mi@...el.com, jiebin.sun@...el.com, gengxin.xie@...el.com,
        fan.zhao@...el.com, Sewook Seo <sewookseo@...gle.com>,
        "David S . Miller" <davem@...emloft.net>,
        Hideaki YOSHIFUJI <yoshfuji@...ux-ipv6.org>,
        David Ahern <dsahern@...nel.org>,
        Jakub Kicinski <kuba@...nel.org>
Subject: [net]  fe1d0fd632: canonical_address#:#[##]



Greeting,

FYI, we noticed the following commit (built with gcc-11):

commit: fe1d0fd632b0a9a439b457d799d8f4c85152cd9a ("[PATCH] net-tcp: Find dst with sk's xfrm policy not ctl_sk")
url: https://github.com/intel-lab-lkp/linux/commits/Sewook-Seo/net-tcp-Find-dst-with-sk-s-xfrm-policy-not-ctl_sk/20220622-042459
base: https://git.kernel.org/cgit/linux/kernel/git/davem/net.git 69135c572d1f84261a6de2a1268513a7e71753e2
patch link: https://lore.kernel.org/netdev/20220621202240.4182683-1-ssewook@gmail.com

in testcase: phoronix-test-suite
version: 
with following parameters:

	test: apache-1.7.2
	cpufreq_governor: performance
	ucode: 0x500320a

test-description: The Phoronix Test Suite is the most comprehensive testing and benchmarking platform available that provides an extensible framework for which new tests can be easily added.
test-url: http://www.phoronix-test-suite.com/


on test machine: 96 threads 2 sockets Intel(R) Xeon(R) Gold 6252 CPU @ 2.10GHz with 512G memory

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):



If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>


[   57.036621][   C63] general protection fault, probably for non-canonical address 0x100000000000176: 0000 [#1] SMP NOPTI
[   57.047662][   C63] CPU: 63 PID: 334 Comm: ksoftirqd/63 Tainted: G S                5.19.0-rc2-00127-gfe1d0fd632b0 #1
[   57.058498][   C63] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0008.031920191559 03/19/2019
[ 57.069833][ C63] RIP: 0010:xfrm_sk_policy_lookup (kbuild/src/consumer/net/xfrm/xfrm_policy.c:2171) 
[ 57.075881][ C63] Code: 56 65 ff 05 ed 43 46 7e 41 55 49 89 d5 41 54 55 89 cd 53 48 89 fb 48 63 f6 4c 8d 76 26 4e 8b 24 f3 4d 85 e4 0f 84 88 00 00 00 <66> 41 39 ac 24 76 01 00 00 75 7d 0f b7 d5 49 8d 7c 24 78 4c 89 ee
All code
========
   0:	56                   	push   %rsi
   1:	65 ff 05 ed 43 46 7e 	incl   %gs:0x7e4643ed(%rip)        # 0x7e4643f5
   8:	41 55                	push   %r13
   a:	49 89 d5             	mov    %rdx,%r13
   d:	41 54                	push   %r12
   f:	55                   	push   %rbp
  10:	89 cd                	mov    %ecx,%ebp
  12:	53                   	push   %rbx
  13:	48 89 fb             	mov    %rdi,%rbx
  16:	48 63 f6             	movslq %esi,%rsi
  19:	4c 8d 76 26          	lea    0x26(%rsi),%r14
  1d:	4e 8b 24 f3          	mov    (%rbx,%r14,8),%r12
  21:	4d 85 e4             	test   %r12,%r12
  24:	0f 84 88 00 00 00    	je     0xb2
  2a:*	66 41 39 ac 24 76 01 	cmp    %bp,0x176(%r12)		<-- trapping instruction
  31:	00 00 
  33:	75 7d                	jne    0xb2
  35:	0f b7 d5             	movzwl %bp,%edx
  38:	49 8d 7c 24 78       	lea    0x78(%r12),%rdi
  3d:	4c 89 ee             	mov    %r13,%rsi

Code starting with the faulting instruction
===========================================
   0:	66 41 39 ac 24 76 01 	cmp    %bp,0x176(%r12)
   7:	00 00 
   9:	75 7d                	jne    0x88
   b:	0f b7 d5             	movzwl %bp,%edx
   e:	49 8d 7c 24 78       	lea    0x78(%r12),%rdi
  13:	4c 89 ee             	mov    %r13,%rsi
[   57.095757][   C63] RSP: 0018:ffffc9000d74fab8 EFLAGS: 00010206
[   57.101908][   C63] RAX: 0000000000000006 RBX: ffff88811735b550 RCX: 000000000000000a
[   57.109975][   C63] RDX: ffffc9000d74fbd8 RSI: 0000000000000001 RDI: ffff88811735b550
[   57.118032][   C63] RBP: 000000000000000a R08: 0000000000000000 R09: 0000000000000000
[   57.126181][   C63] R10: 0000000000000000 R11: 000000000000000a R12: 0100000000000000
[   57.134276][   C63] R13: ffffc9000d74fbd8 R14: 0000000000000027 R15: 0000000000000000
[   57.142339][   C63] FS:  0000000000000000(0000) GS:ffff88bf7ffc0000(0000) knlGS:0000000000000000
[   57.151392][   C63] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   57.158068][   C63] CR2: 00007f8321601000 CR3: 00000002c5f34002 CR4: 00000000007706e0
[   57.166135][   C63] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   57.174200][   C63] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   57.182265][   C63] PKRU: 55555554
[   57.185910][   C63] Call Trace:
[   57.189298][   C63]  <TASK>
[ 57.192342][ C63] xfrm_lookup_with_ifid (kbuild/src/consumer/net/xfrm/xfrm_policy.c:3051) 
[ 57.197647][ C63] xfrm_lookup_route (kbuild/src/consumer/net/xfrm/xfrm_policy.c:3206) 
[ 57.202561][ C63] tcp_v6_send_response (kbuild/src/consumer/net/ipv6/tcp_ipv6.c:957) 
[ 57.207871][ C63] tcp_v6_rcv (kbuild/src/consumer/net/ipv6/tcp_ipv6.c:1101 kbuild/src/consumer/net/ipv6/tcp_ipv6.c:1818) 


To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        sudo bin/lkp install job.yaml           # job file is attached in this email
        bin/lkp split-job --compatible job.yaml # generate the yaml file for lkp run
        sudo bin/lkp run generated-yaml-file

        # if come across any failure that blocks the test,
        # please remove ~/.lkp and /lkp dir to run from a clean state.



-- 
0-DAY CI Kernel Test Service
https://01.org/lkp



View attachment "config-5.19.0-rc2-00127-gfe1d0fd632b0" of type "text/plain" (163951 bytes)

View attachment "job-script" of type "text/plain" (7775 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (24572 bytes)

View attachment "job.yaml" of type "text/plain" (4676 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ