lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <YufXncrWhJZH0ifB@xsang-OptiPlex-9020>
Date:   Mon, 1 Aug 2022 21:39:41 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Yee Lee <yee.lee@...iatek.com>
CC:     Andrew Morton <akpm@...ux-foundation.org>,
        Catalin Marinas <catalin.marinas@....com>,
        Marco Elver <elver@...gle.com>,
        Geert Uytterhoeven <geert+renesas@...der.be>,
        LKML <linux-kernel@...r.kernel.org>,
        <kasan-dev@...glegroups.com>, <lkp@...ts.01.org>, <lkp@...el.com>
Subject: [mm]  07313a2b29: kernel_BUG_at_arch/x86/mm/physaddr.c


(please be noted we reported
"[mm]  f6a6cf9d13: kernel_BUG_at_arch/x86/mm/physaddr.c"
on
https://lore.kernel.org/all/YsFeUHkrFTQ7T51Q@xsang-OptiPlex-9020/
now we noticed this issue still exist on mainline. FYI)


Greeting,

FYI, we noticed the following commit (built with gcc-11):

commit: 07313a2b29ed1079eaa7722624544b97b3ead84b ("mm: kfence: apply kmemleak_ignore_phys on early allocated pool")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master

in testcase: boot

on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):


+------------------------------------------+------------+------------+
|                                          | 14c99d6594 | 07313a2b29 |
+------------------------------------------+------------+------------+
| boot_successes                           | 34         | 0          |
| boot_failures                            | 0          | 31         |
| kernel_BUG_at_arch/x86/mm/physaddr.c     | 0          | 31         |
| invalid_opcode:#[##]                     | 0          | 31         |
| EIP:__phys_addr                          | 0          | 31         |
| Kernel_panic-not_syncing:Fatal_exception | 0          | 31         |
+------------------------------------------+------------+------------+


If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>


[    2.602721][    T0] ------------[ cut here ]------------
[    2.603075][    T0] kernel BUG at arch/x86/mm/physaddr.c:81!
[    2.603455][    T0] invalid opcode: 0000 [#1]
[    2.603750][    T0] CPU: 0 PID: 0 Comm: swapper Not tainted 5.19.0-rc4-00010-g07313a2b29ed #1
[    2.604311][    T0] EIP: __phys_addr+0xe7/0x10d
[    2.604627][    T0] Code: 00 e8 1f 66 00 00 83 05 d0 98 73 43 01 83 15 d4 98 73 43 00 85 d2 75 04 39 f0 74 2c 83 05 d8 98 73 43 01 83 15 dc 98 73 43
00 <0f> 0b 83 05 e0 98 73 43 01 83 15 e4 98 73 43 00 83 05 b0 98 73 43
[    2.605912][    T0] EAX: 5c10e000 EBX: e3ef1000 ECX: 00000000 EDX: 00000fff
[    2.606375][    T0] ESI: a3ef1000 EDI: 036b0000 EBP: 42ce1f74 ESP: 42ce1f6c
[    2.606833][    T0] DS: 007b ES: 007b FS: 0000 GS: 0000 SS: 0068 EFLAGS: 00210046
[    2.607329][    T0] CR0: 80050033 CR2: ffbff000 CR3: 036f4000 CR4: 000406b0
[    2.607788][    T0] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[    2.608246][    T0] DR6: fffe0ff0 DR7: 00000400
[    2.608544][    T0] Call Trace:
[    2.608758][    T0]  ? kfence_init_pool_early+0x55/0x13e
[    2.609110][    T0]  ? kfence_init+0x42/0xa1
[    2.609395][    T0]  ? start_kernel+0x5de/0xa06
[    2.609698][    T0]  ? i386_start_kernel+0xf8/0x10a
[    2.610021][    T0]  ? startup_32_smp+0x15c/0x160
[    2.610335][    T0] Modules linked in:
[    2.610584][    T0] ---[ end trace 0000000000000000 ]---
[    2.610935][    T0] EIP: __phys_addr+0xe7/0x10d
[    2.611233][    T0] Code: 00 e8 1f 66 00 00 83 05 d0 98 73 43 01 83 15 d4 98 73 43 00 85 d2 75 04 39 f0 74 2c 83 05 d8 98 73 43 01 83 15 dc 98 73 43 00 <0f> 0b 83 05 e0 98 73 43 01 83 15 e4 98 73 43 00 83 05 b0 98 73 43
[    2.612524][    T0] EAX: 5c10e000 EBX: e3ef1000 ECX: 00000000 EDX: 00000fff
[    2.612993][    T0] ESI: a3ef1000 EDI: 036b0000 EBP: 42ce1f74 ESP: 42ce1f6c
[    2.613468][    T0] DS: 007b ES: 007b FS: 0000 GS: 0000 SS: 0068 EFLAGS: 00210046
[    2.613971][    T0] CR0: 80050033 CR2: ffbff000 CR3: 036f4000 CR4: 000406b0
[    2.614440][    T0] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[    2.614908][    T0] DR6: fffe0ff0 DR7: 00000400
[    2.615218][    T0] Kernel panic - not syncing: Fatal exception



To reproduce:

        # build kernel
	cd linux
	cp config-5.19.0-rc4-00010-g07313a2b29ed .config
	make HOSTCC=gcc-11 CC=gcc-11 ARCH=i386 olddefconfig prepare modules_prepare bzImage modules
	make HOSTCC=gcc-11 CC=gcc-11 ARCH=i386 INSTALL_MOD_PATH=<mod-install-dir> modules_install
	cd <mod-install-dir>
	find lib/ | cpio -o -H newc --quiet | gzip > modules.cgz


        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> -m modules.cgz job-script # job-script is attached in this email

        # if come across any failure that blocks the test,
        # please remove ~/.lkp and /lkp dir to run from a clean state.



-- 
0-DAY CI Kernel Test Service
https://01.org/lkp



View attachment "config-5.19.0-rc4-00010-g07313a2b29ed" of type "text/plain" (142430 bytes)

View attachment "job-script" of type "text/plain" (4778 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (4452 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ